Latest Publications

Share:

Data Protection Law- A Broken Shield

Sweeping statements made in an Executive Order issued five days into the Trump administration have cast doubt on the legal status of the EU-US Privacy Shield and have caused at least one highly-placed EU politician to...more

A Case Study on How Regional Manufacturing Firms Are Increasingly the Targets of Cybercrime

As their methods evolve, cybercriminals are increasingly targeting regional manufacturing businesses with sophisticated and potentially costly attacks. A recent ransomware attack on a mid-sized manufacturer in the Southeast...more

Geo Political Cyber Warfare And Your Business

The cyber war battlefield has expanded, and your business is now a fighter and a target. A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more

Michigan State Data Breach and the Value of Preparedness

Michigan State University’s announcement earlier this month that hackers had gained access to a school database of about 400,000 records highlights why colleges and universities are such tempting targets for hackers and just...more

Cyber Fatigue: New NIST Study Reveals Consumers Feel Overwhelmed by Security Messages, Compliance

Data breaches. Stolen passwords. Confidential data compromised. We’ve all heard the cybersecurity horror stories. In fact, we may have heard them too often. According to a new study by National Institute of...more

11/14/2016  /  Data Breach , Information Reports , NIST

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

Cyber Security IMPOSSIBLE: California AG Decides a Ceiling is a Floor

We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more

32 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide