Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
Why Privacy Matters to Your Business and What's in Store for 2025
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Cost of Noncompliance: More Than Just Fines
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
2023 DSIR Report Deeper Dive into the Data
Episode 282 -- CISO and CCOs -- The Evolving Partnership
Cyber Threats
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
[Podcast] NSA Cybersecurity Services for Defense Contractors
Dark Web Monitoring - Unauthorized Access Podcast
This odyssey began when an old laptop was discovered by a curious 14-year-old boy in Kansas. The boy, known only as “QR,” used it to sneak onto a handful of adult websites over two months last year, racking up 118 virtual...more
Online abuse in sports has reached alarming levels, targeting athletes, coaches, and officials, especially during high-profile events. Recognizing the growing threat, the National Collegiate Athletics Association (NCAA)...more
The United States Supreme Court announced on December 18, 2024, that it will hear the TikTok ban case and has scheduled oral arguments to be held on January 10, 2025, before the ban’s effective date of January 19, 2025....more
“It’s the most wonderful time of the year”—or is it? Unfortunately, it can be the most wonderful time for criminals, who try to prey on financial generosity through scams and frauds. Extra vigilance is needed during the...more
CYBERSECURITY - Health Care Entities Continue to Get Pummeled by Cybersecurity Attacks - The newest health care entity to be hit by a cyberattack is Ascension Health, which operates 140 hospitals and 40 assisted living...more
Ex-CEO's lawsuit against the comedian/activist will proceed. Who ever thought personal jurisdiction could be interesting? In April 2021, the CEO of a telehealth company was eating dinner with his wife at a hotel in a suburb...more
Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more
In recent years, products liability law has been significantly impacted by advancements in technology, particularly with the rise of artificial intelligence (AI) and automation. As more companies adopt these technologies to...more
The recent wave of mass layoffs has created an uptick in protests and demonstrations by those affected. In some cases, pay and benefit cuts in lieu of layoffs have also resulted in significant repercussions, as evident by the...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more
Following the escalation of tensions between the United States and Iran in the past week, the Health Information Sharing and Analysis Center (H-ISAC) is warning hospitals and health systems that Iran could attack health...more
When it comes to digital threats, universities must protect not only a broad and deeply layered infrastructure, but also vast populations of students. In this episode, Elisa D’Amico and Desiree Moore outline their top five...more
This week the Securities and Exchange Commission (SEC) issued an investigative report that outlined cyber incidents that nine public companies had experienced, causing fraudulent losses totaling more than $100 million. The...more
Use of social media is pervasive, invasive, consuming, and immensely entertaining. It can also be a useful business tool on an individual and a business level. We are all also aware — or should be by now — that posts are...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
On 4 November 2015 the Home Secretary published a Draft Investigatory Powers Bill (the “Bill”), emphasising its importance in combating the increasingly sophisticated communication technologies used by criminals to intercept,...more
Non-Enforcement - SEC Decides Against Mounting an Appeal in Koch Ruling - The July 2015 ruling by the D.C. Circuit Court in Koch v. SEC will apparently not be challenged by the SEC. The Court ruled in that...more