More Cybersecurity Articles

Cybersecurity

After the Breach: When cybersecurity fails, forensics specialists come in to investigate the theft

All the attention cybersecurity has garnered recently makes it easy to forget that computer forensics goes back long before the days of Dropbox, thumb drives, BYOD and the cloud. The contrast is not lost on RVM’s Greg Cancilla, who got his start during a time that now feels like a bygone era...

Read More

Cybersecurity

The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically

These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention. Acronyms and...

Read More

Cybersecurity

Four Things Lawyers Can Do to Improve Cyber-Risk Programs: You need to think of yourself as both a steward and a shepherd

The role of corporate counsel has been rapidly evolving in the past few years. The scope of responsibilities has expanded beyond legal administrative tasks to include companywide risk management, cost control, regulatory compliance and other areas that affect the company’s reputation and...

Read More

Recent Cybersecurity Video