Cybersecurity
More Cybersecurity Articles
Cybersecurity
After the Breach: When cybersecurity fails, forensics specialists come in to investigate the theft
All the attention cybersecurity has garnered recently makes it easy to forget that computer forensics goes back long before the days of Dropbox, thumb drives, BYOD and the cloud. The contrast is not lost on RVM’s Greg Cancilla, who got his start during a time that now feels like a bygone era...
Read MoreCybersecurity
The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically
These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention. Acronyms and...
Read MoreCybersecurity
Four Things Lawyers Can Do to Improve Cyber-Risk Programs: You need to think of yourself as both a steward and a shepherd
The role of corporate counsel has been rapidly evolving in the past few years. The scope of responsibilities has expanded beyond legal administrative tasks to include companywide risk management, cost control, regulatory compliance and other areas that affect the company’s reputation and...
Read More