Data Privacy & Cybersecurity
A review of serious data breaches and vulnerabilities, from IBM security services, based on an analysis of its own client […]
Pension and welfare plans store participant and beneficiary personal data that is of interest to cyber attackers. Not only does […]
A decision from the Eighth Circuit Court of Appeals upheld a district court summary judgment for the policy holder in […]
More companies are coming to see cybersecurity as part of a larger compliance and integrity program, rather than shunting it […]
Most people in the U.S., including regulators, seem comfortable with the notion that a few U.S. behemoths are on their way to becoming both gatekeeper and gate, but in much of the rest of the world there is alarm.
Many companies use third party social media sites, for a variety of purposes including marketing and interacting with customers. A […]
The man responsible for hacking personal email accounts that revealed Hillary Clinton’s habit of using a personal email account for […]
The amount and detail of information contained in metadata (data about data embedded in files) is staggering, and it can […]
This list of seven best practices to achieve “cyber resilience” is based on Symantec’s 2016 Internet Security Threat Report. Some […]
The U.S. intelligence community has “already had some indications” of hacking attempts on presidential campaigns, U.S. National Intelligence Director James […]
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.