Why is the FBI warning about smart TV cybersecurity? Because a smart TV is a computer -- it is just built into a really large monitor -- and it should be secured like a computer because hackers can hack it just like any other computer. (See FBI Warning)Listen to Shawn Tuma discuss this issue on … Continue reading Why is the FBI Warning About Smart TVs?
Back in early 2012, I wrote a blog post about whether hacking a human would violate the federal Computer Fraud and Abuse Act. Shortly after publishing it, I received a call from a guy in Austin who said: "dude, someone finally gets it, I need your help!" ... I responded that I was a lawyer, … Continue reading Scientists warn brain implants can be hacked and used to control people (and you thought I was kidding?)
Countdown to GDPR Compliance is a complimentary webinar that I will be moderating on Thursday, December 7, 2017, at 12:00 PM Central. This is the second webinar in a three-part series sponsored by Mackrell International and will focus on Compliance for Non-EU Companies. You don't want to miss it! Moderator: Shawn Tuma Presenter: Marta Stephanian, … Continue reading Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies
On August 1, 2017, the Senate Cybersecurity Caucus introduced the "Internet of Things (IoT) Cybersecurity Improvement Act of 2017," bi-partisan legislation focused on establishing minimum security requirements for the federal procurement of Internet connected devices (#IoT). The legislation is directed at vendors who supply IoT devices to the federal government. It requires that such products are … Continue reading IoT Cybersecurity Improvement Act of 2017 proposed by Senate Cybersecurity Caucus
I thought you may like an invitation to attend two complimentary webinars that I will be doing this coming week: YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) Monday, August 7, 2017 @ 12:00 CDT LINK for more information FULL VIDEO (see below) Securing IoT Data: Compliance, … Continue reading Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data