No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
2022 DSIR Deeper Dive: NFTs
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
According to a recent press release, a major U.S. bank has entered into a strategic partnership with the largest U.S. cryptocurrency exchange platform. This collaboration reportedly aims to expand access to secure digital...more
The widespread and debilitating impacts of the recent faulty Crowdstrike® software update has caused businesses to evaluate processes and examine potential claims and defenses related to the deleterious commercial impacts of...more
In 2022, threat actors and hacker groups made their mark on the digital world by causing unprecedented data breaches that left organizations of all sizes and sectors vulnerable. Even with improved cybersecurity measures in...more
According to recent media reports there have been several instances of blockchain bridges being hacked this year, including reports on August 2 that a bridge lost close to $200 million to upwards of 40 hackers who exploited a...more
Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more
The hack of the Hong-Kong based crypto-exchange Bitfinex has been described as the “heist of the century”. Where a crypto-asset is in play in litigation, in particular as a potential target for enforcement, parties should be...more
As ransomware attacks continue to become more of a concern for employers of all sizes, an increasing number of hackers are demanding cryptocurrency such as Bitcoin in exchange for ending their attack. The recent ransomware...more
CYBERSECURITY - NYDFS - Cybersecurity Certificate of Compliance Due April 15, 2021 The New York Department of Financial Services (DFS), which regulates certain covered entities and licensed persons in the financial...more
U.S. Judge Halts Trump's TikTok Ban, Hours Before It was Set to Start - "John Hall, an attorney for TikTok, said that the app, with some 100 million American users, is a 'modern day version of the town square' and shutting...more
Once purely theoretical, “majority” or “51%” attacks on public blockchains have dealt participants a reality check: The fundamental assumption of Satoshi Nakamoto’s 2008 Bitcoin whitepaper (that computing power will remain...more
Crypto and Blockchain Capital Markets News From UNICEF, Europe and Hong Kong - On Wednesday, the United Nations Children’s Fund (UNICEF) announced its launch of a newly established cryptocurrency fund, making it the first UN...more
It is so hard to keep up with the latest ways the bad guys try to infiltrate company data. One new technique is called warshipping, and its implementation is pretty simple and a little old school. ...more
Recent developments in the energy sector indicate that blockchain technology is being embraced to address a range of issues including network security and improved integration of renewable generation and demand response...more
Adoption of Blockchain Solutions Spreads Across Industries - Last week, a major U.S. international shipping conglomerate announced plans to collaborate with Inxeption, an e-commerce technology company, to build a platform...more
Sorta, kinda, immutable. Turns out the blockchain CAN get hacked, and changed. In the blockchain, a miner who somehow gains control of a majority of the network’s mining power (a so-called “51% attack”) can defraud other...more
Blockchain Pilots for Supply Chain and Land Titles, Improved Analytics, and Decentralization - Earlier this week IBM announced the completion of a shipment tracking trial that recorded the bill of lading on a blockchain....more
The Blockchain Effect: NASA, IoT, Supply Chain and State Initiatives - On Monday, NASA Ames Research Center published a paper about a permissioned blockchain framework that addresses privacy and security issues for FAA air...more
New Year’s is a time to look back on the happenings of the year and focus on the lessons and reminders those events have provided. For our final newsletter of the year, we’d like to share with you our top 10 most read posts...more
With the American midterms approaching, computerized voting is getting significant media attention. Depending on the state, ballots can be lengthy and confusing, poll queues long and slow, and voters frustrated. At first...more
The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more
New York Attorney General Issues Virtual Markets Integrity Initiative Report - On Sept. 18, 2018, the New York Attorney General’s Office released its Virtual Markets Integrity Initiative Report. The report addressed 10 major...more
It has been reported that a hacker was able to break into the servers of TheTruthSpy, a company that is described as “one of the most notorious stalkerware companies out there” (Motherboard, August 2018) and was able to steal...more
New Blockchain Trading Platforms and Capital Markets Offerings Announced - Recently, it was reported that a popular Colorado resort planned to sell “Aspen Coins” in a Reg D 506(c) offering on a token trading platform...more
The Federal Energy Regulatory Commission (FERC) announced on July 19, 2018, that it is directing the North American Electric Reliability Corporation (NERC) “to develop and submit modifications to the NERC Reliability...more
With every new technology, there are security risks. Blockchain is no exception. The recently published McAfee Blockchain Threat Report by McAfee’s Advanced Threat Research team analysts explains the current threats against...more