Podcast - The Role of Managed Service Providers with Stuart Itkin
Cybersecurity in Video Games & Esports
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Overview of Cybersecurity in Government Contracts
Cyber Threats
2022 DSIR Deeper Dive: NFTs
What to Do When a Phishing Attack Happens to You - The Consumer Finance Podcast
Hybrid Workforces and Compliance with Sheila Limmroth
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
Phishing: Cybersecurity’s Biggest Threat
Jenny Radcliffe on People Hacking
Debra Geroux and Scott Wrobel on Responding to Data Breaches
No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars
#WorkforceWednesday: Extended Remote Work, Return-to-Work Manager Training, Case to Watch - Employment Law This Week®
JONES DAY PRESENTS®: AI: Security and Privacy Risks with Big Data
Zoom Security Best Practices
Cyber Insurance 101: What It Is And Why You Need It
Phishing and Vishing and Smishing (Oh my!): New Types of Scams Require Increased Vigilance
Life With GDPR: Episode 24- Phishing
Happy Saturday from Seattle . . . Our Online Travel Update for the week ending Friday, March 14, 2025, is below. What started as a relatively quiet week in the travel industry (other than the concerning reports from several...more
Ankura has seen an increase in threat actors utilizing Amazon AWS, Google Cloud, and Microsoft Azure to obfuscate their malicious activities and make the traffic appear legitimate. So, what does this look like?...more
It used to be that one of the sure ways to identify a phishing email was to notice grammatical errors or broken English in the text of the communication. Thanks to new translation tools like Google Translate, that are...more
In the face of the ever-growing threat of cyberattacks disguised in emails from phishers, impostors and other increasingly sophisticated security scammers, Google has launched a tool to allow organizations to fight back by...more
We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more
U.S. Judge Halts Trump's TikTok Ban, Hours Before It was Set to Start - "John Hall, an attorney for TikTok, said that the app, with some 100 million American users, is a 'modern day version of the town square' and shutting...more
You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more
Google has warned users in a blog article that nation state-backed hackers are using the COVID-19 crisis to ramp up phishing attempts and, in one example, are posing as American fast food franchises and sending malicious...more
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities in order to listen to users’ every word to...more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities to be able to listen to users’ every word...more
Increasingly, insureds faced with cyber fraud losses are going to the courts to interpret their policies. In The Brick Warehouse LP v. Chubb Insurance Company of Canada, 2017 ABQB 413 [The Brick Warehouse], and in Taylor &...more
If you check your email this afternoon, you may see a message that someone you know is sharing something on Google Docs....more
Judge Trims Proposed Class Action Over Wendy’s Data Breach - Torres v. Wendy’s Int’l, LLC, No. 16-cv-0210 (PGB) (DCI) (M.D. Fla. Mar. 21, 2017). A U.S. district court judge in Florida trimmed a proposed class action...more
Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more