Monday, June 2, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Avatar photo
Mark Rasch
Mark Rasch is a lawyer and computer security and privacy expert in Bethesda, Maryland. where he helps develop strategy and messaging for the Information Security team. Rasch’s career spans more than 35 years of corporate and government cybersecurity, computer privacy, regulatory compliance, computer forensics and incident response. He is trained as a lawyer and was the Chief Security Evangelist for Verizon Enterprise Solutions (VES). He is recognized author of numerous security- and privacy-related articles. Prior to joining Verizon, he taught courses in cybersecurity, law, policy and technology at various colleges and Universities including the University of Maryland, George Mason University, Georgetown University, and the American University School of law and was active with the American Bar Association’s Privacy and Cybersecurity Committees and the Computers, Freedom and Privacy Conference. Rasch had worked as cyberlaw editor for SecurityCurrent.com, as Chief Privacy Officer for SAIC, and as Director or Managing Director at various information security consulting companies, including CSC, FTI Consulting, Solutionary, Predictive Systems, and Global Integrity Corp. Earlier in his career, Rasch was with the U.S. Department of Justice where he led the department’s efforts to investigate and prosecute cyber and high-technology crime, starting the computer crime unit within the Criminal Division’s Fraud Section, efforts which eventually led to the creation of the Computer Crime and Intellectual Property Section of the Criminal Division. He was responsible for various high-profile computer crime prosecutions, including Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris. Prior to joining Verizon, Mark was a frequent commentator in the media on issues related to information security, appearing on BBC, CBC, Fox News, CNN, NBC News, ABC News, the New York Times, the Wall Street Journal and many other outlets.

communications, wiretap, watch,

Is it Illegal to Listen to a Podcast or Watch a Movie Online?

Mark Rasch | May 16, 2025 | communication, downloading, Podcasts, streaming
Defining wire communications, and whether the wiretap statute makes it illegal to listen to a podcast or watch a movie online? ... Read More
Security Boulevard
ai agents, tools, cybercrime,

The AI Alibi Defense: How General-Purpose AI Agents Obscure Criminal Liability

Mark Rasch | April 7, 2025 | Agentic AI, AI agents, cybercrime, Law, liability
As these AI agents become more capable of behaving like autonomous actors — clicking, typing, downloading, exfiltrating, or engaging in arguably criminal behavior — they may also become unintended scapegoats or even tools of plausible deniability ... Read More
Security Boulevard
PIN, Password, authentication security IAM privacy cloud security Biometrics: Giving the Government the Finger

The PIN is Mightier Than the Face

Mark Rasch | March 31, 2025 | access, biometrics, identity, Password, pin
People pick weak passwords or reuse them over devices, tokens are lost, compromised or bypassed, and biometrics can be forced or spoofed ... Read More
Security Boulevard
Email, fraud, scam fraud

Business Email Compromise, ACH Transactions, and Liability

Mark Rasch | March 27, 2025 | bec, email, Fraud
Business Email Compromise (BEC) fraud represents one of the most insidious threats facing businesses and individuals today ... Read More
Security Boulevard
food stamp fraud, Geofence, warrant, enforcement, DOJ AI crime

Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit

Mark Rasch | March 21, 2025 | Geofence, google, law enforcement, Location, Privacy, tracking
Geofence warrants are a relatively new tool that allows law enforcement to obtain location data from devices within a specified geographic area during a specific time frame ... Read More
Security Boulevard
Russian, threats, Kapersky, cyberespionage,

“My Vas Pokhoronim!”

Mark Rasch | March 18, 2025 | cyberattacks, Cyberwar, Ransomware, Russia
CISA, in collaboration with the FBI and NSA, identified and attributed multiple attacks to Russian entities, emphasizing the risks posed by state-backed Advanced Persistent Threats (APTs) ... Read More
Security Boulevard
authentication, SMS, buddy system, credential stuffing attack

The Buddy System: Why Google is Finally Killing SMS Authentication

Mark Rasch | March 10, 2025 | google, QR Codes, SMS authentication
Like the Buddy System in The Simpsons, SMS authentication was only foolproof if everything went right. But when both “buddies” could be compromised at the same time, the entire system was doomed to fail ... Read More
Security Boulevard
web, scraping, data, AI, ransomware cybersecurity

AI, Web Scraping and the Transformation of Data Privacy: What the EDPB’s Rulings Mean for Businesses

Mark Rasch | March 6, 2025 | AI, data, web scraping
Web scraping is no longer just about collecting raw data. AI transforms this data, embedding it into machine learning models that can generate insights, predict behaviors and even infer new information about individuals in ways that were never intended when the data was first made public ... Read More
Security Boulevard
DOGE, judge, privacy, protect, SSE data privacy balance cybersecurity

DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation

Mark Rasch | March 3, 2025 | breaches, Data breaches, Privacy, security breaches
If a company has effective insurance, prevention becomes even less cost-effective. By failing to “value” privacy alone, the system skews in favor of not protecting privacy ... Read More
Security Boulevard
privacy, data, entanglement, consumers privacy framework

Data Entanglement, AI and Privacy: Why the Law Isn’t Ready

Mark Rasch | February 25, 2025 | CCPA, data, data entanglement, GDPR, privacy laws
As data continues to fuel AI’s evolution, the fight for privacy will become more complex and more urgent than ever before ... Read More
Security Boulevard
  • 1
  • 2
  • 3
  • …
  • 23
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Security Field Day

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Microsoft Opens Windows Update to 3rd-Party Apps
SentinelOne Outage Leaves Security Teams Hanging for Six Hours
AI is a Ticking Time Bomb for Your Data, Reveals New Report From Varonis 
Microsoft Authenticator Phases Out Password Features and Apple Watch Support
Cybersecurity Alert: Major Breaches at TikTok and Ticketmaster
CISA’s New SOAR Guidance Shows Where Automation Must Go Next
What Is MCP? The New Protocol Reshaping AI Agent Security
19 Billion Passwords Leaked: Protect Yourself from Cyber Threats

Industry Spotlight

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Industry Spotlight News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

May 30, 2025 Jeffrey Burt | 3 days ago 0
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers

May 29, 2025 Jeffrey Burt | 4 days ago 0
Microsoft Opens Windows Update to 3rd-Party Apps
Application Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Microsoft Opens Windows Update to 3rd-Party Apps

May 29, 2025 Richi Jennings | 4 days ago 0

Top Stories

Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks
Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Mobile Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks

June 2, 2025 Jeffrey Burt | 3 hours ago 0
U.S., Dutch Agencies Shut Down AVCheck Services Used by Threat Groups
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

U.S., Dutch Agencies Shut Down AVCheck Services Used by Threat Groups

June 2, 2025 Jeffrey Burt | 5 hours ago 0
Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps
AI and Machine Learning in Security AI and ML in Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps

June 2, 2025 Michael Vizard | 9 hours ago 0

Download Free eBook

Managing the AppSec Toolstack

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×