More Cybersecurity Articles

Cybersecurity

The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically

These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention. Acronyms and...

Read More

Cybersecurity

Four Things Lawyers Can Do to Improve Cyber-Risk Programs: You need to think of yourself as both a steward and a shepherd

The role of corporate counsel has been rapidly evolving in the past few years. The scope of responsibilities has expanded beyond legal administrative tasks to include companywide risk management, cost control, regulatory compliance and other areas that affect the company’s reputation and...

Read More

Cybersecurity

5 Tips to Help Mitigate Insider Theft: It starts with defining the line between personal and corporate information

Information is an extraordinarily prized corporate asset. In today’s digital age, that information is stored electronically. For example, software companies store their highly valuable intellectual property in code repositories. Healthcare companies store personal medical records in an...

Read More

Recent Cybersecurity Video