Latest Posts › Unauthorized Access

Share:

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Caregivers in Cybersecurity — Unauthorized Access Podcast [Audio]

Unauthorized Access, our privacy and cybersecurity-focused podcast, spotlights the human side of the cybersecurity industry. In this episode, Sadia welcomes Sherri Davidoff, CEO of LMG Security, to discuss the challenges and...more

Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast [Audio]

Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing....more

Ross Is Boss — Unauthorized Access Podcast [Audio]

Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing. In...more

Unauthorized Access Returns With "Get to Know Joe" — Unauthorized Access Podcast [Audio]

It’s official! The Unauthorized Access podcast has returned, now with a slightly different spin. Our monthly podcast will spotlight the human aspect of cybersecurity, bringing you closer to the remarkable personalities...more

Panel Pursuit: The Ins and Outs of Becoming a Preferred Panel Vendor - Unauthorized Access Podcast [Audio]

In this episode of Unauthorized Access, Kamran Salour and Sadia Mirza welcome Assistant Vice President of Cyber Services and Incident Response Linda Comerford of AmTrust. During this discussion, Linda navigates the steps of...more

Dark Web Monitoring - Unauthorized Access Podcast [Audio]

Immediately following a three-day stint at the Summer 2022 Net Diligence conference in Philadelphia, Kamran and Sadia welcome Kroll’s Keith Wojcieszek to the Unauthorized Access podcast. In this episode, the trio discuss...more

Unauthorized Access: An Inside Look at Incident Response [Audio]

Unauthorized Access provides an insightful and interesting recap of the latest developments in cybersecurity. Each month our (mildly funny) hosts, Kamran Salour and Sadia Mirza, will discuss updates on legal developments and...more

Ninth Circuit Provides Guidance on Web Scraping

On April 18, the Ninth Circuit issued its opinion in hiQ Labs, Inc. v. LinkedIn Corporation in which the court clarified its position on an important topic: whether the common practice of data “web scraping” can create...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide