Strange Bedfellows: Software, Security and the Law
During this live panel roundtable, experts from security, software and legal disciplines discuss some of the top cyberlaw and legal topics affecting software supply chain security ...
Hacktivism Against States Grows After Overturn of Roe v. Wade
State and local governments need to prepare and respond to a new round of cyber attacks coming from groups claiming to be protesting the Supreme Court overturning Roe v. Wade last Friday ...
Biden Signs State and Local Government Cybersecurity Act Into Law; Establishes Rotational Cyber Workforce
Blogs Blog Biden Signs State and Local Government Cybersecurity Act Into Law; Establishes Rotational Cyber Workforce President Biden signed two cyber-related bills into law on July 21, both of which aim to ...
Biden Signs State and Local Government Cybersecurity Act Into Law; Establishes Rotational Cyber Workforce
President Biden signed two cyber-related bills into law on June 21, both of which aim to bolster the cybersecurity capabilities at—and across—various government entities. The post Biden Signs State and Local Government ...
Top 10 Security Challenges for 2022
This time of year is traditionally for either looking back at the previous year or looking forward to the year ahead. While there have been great advances over the years with respect ...
Security Boulevard
Inside Ireland’s Public Healthcare Ransomware Scare
BrianKrebs | | A Little Sunshine, Conti ransomware, Data breaches, H-ISAC, Health Service Executive, HSE, ireland, PriceWaterhouseCoopers, Ransomware, Ryuk
The accounting firm PricewatersCoopers recently published lessons learned from the disruptive and costly ransomware attack in May 2021 on Ireland's public health system. The unusually candid post-mortem found that nearly two months ...
Can the Government Compel You To Produce Records That Don’t Exist Yet?
We all know that the government can get a subpoena compelling you to produce records that are in your “possession, custody or control,” provided those records are not privileged, along with a ...
Security Boulevard
Supreme Court To Decide Scope of Federal Hacking Law
For more than 30 years, the federal computer hacking statute has been used by companies to sue employees (and former employees), competitors and even customers and users who violate their rules on ...
Security Boulevard
EARN IT Act and How Encryption is Related to Freedom of Speech
Since the EARN IT Act was introduced in early March 2020, it was met with strong opposition by privacy groups and academia. The Act has been called “a disaster for Internet users’ ...