The Privacy Insider Podcast Episode 14: The Pig Around the Corner: Privacy and Trade with Constantine Karbaliotis of nNovation LLP
2025 Privacy Law Preview: Be Prepared
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
Caregivers in Cybersecurity — Unauthorized Access Podcast
#WorkforceWednesday: California's Upcoming Cyber Audit and Automated Tech Rules - Employment Law This Week®
Data Dividend: What is Personal Data Worth?
Podcast: Data Privacy and Info Security in Finance: The Lay of the Land [More with McGlinchey, Ep. 52]
2023 New Data Privacy Requirements
Guidepost in Motion EP27: Privacy Matters Part 2: “TMI”-The Privacy Dilemma of Social Media
Webinar Recording – Assessing the Surge in Wiretap Litigation
2022 DSIR Deeper Dive: Class Action Jurisprudence
Interview With Ayesha Minhaj, Google - Digital Planning Podcast
Colorado’s New Comprehensive Privacy Law
#WorkforceWednesday: 2020 in Review and What's to Come in 2021
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
On-Demand Webinar | Protecting Information in a Work-From-Home World
Social media is used by both organizations and employees—as a marketing tool for business, for entertainment, or for interacting with friends and family....more
The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more
When we are retained by clients to guide them through a cyber-attack in which information has been stolen by a threat actor, we almost always find that the client has unnecessarily stored sensitive information far beyond the...more
Unfortunately, identity theft continues to increase, and according to Identitytheft.org, the statistics are going to get worse in 2025. Some of the statistics cited by Identitytheft.org include: 1.4 million complaints of...more
HaveIBeenPwned is a website that allows users to check whether their data has been involved in data breaches. The website’s creator, Troy Hunt, was the subject of a phishing attack earlier this week....more
The productivity paradox: Does more technology mean less growth? Nobel Prize-winning economist Robert Solow famously remarked, “You can see the computer age everywhere except in the productivity statistics.” This paradox...more
More than two months after the February 2024 Change Healthcare cyber-ransom attack, the healthcare industry continues to grapple with the fallout, creating significant challenges, disruptions, and outages to the healthcare...more
Research from Guidepoint Security found that 2023 saw an 80% increase in ransomware activity year-over-year, driven in part by multiple mass exploitation campaigns impacting hundreds of organizations. In total, the report...more
Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more
Cybersecurity is a top concern for all industries, particularly for the pharmaceutical and medical device industries. These industries hold some of the most sensitive data and highly valuable technology, making them prime...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
As cyber-attacks and data breaches pose an increasing threat to market participants, the US Securities and Exchange Commission (“SEC”) has become increasingly focused on the cyber risks to the public and the market at large....more
Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more