Blog Archives

Chilling Effect Impact

Surveillance, First Amendment Rights and the “Chilling Effect”

by Curt Monash of The Monash Report

In which I observe that Tim Cook and the EFF, while thankfully on the right track, haven’t gone nearly far enough.

Traditionally, the term “chilling effect” referred specifically to inhibitions on what in the US are regarded as First Amendment rights — the freedoms of speech,

Read more ›

Posted in Content, Governent Oversight, Government Surveilance, Incident Response, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , , , , ,

Cyberattack and the Attorney-client Privilege

Cyberattack upends attorney-client privilege

by Susan Hansen

“Dear Clients,” began the letter that law firm Ziprick & Cramer sent out in late February. “It is almost a daily occurrence that we read about cyberattacks in the news. Unfortunately, on or around January 25,

Read more ›

Posted in Breach, Compliance, Cyberattack, Cybersecurity, Fraud, Hacks, Incident Response, Legal, Privacy, Privacy Laws, Risk Management


The Threat of the Malicious Insider

The Malicious Insider is already inside your defenses. How do you detect and defeat them?

by , Tripwire

Financial gain or fraud was the primary driver of the 11,698 instances of insider privilege abuse  defined as any unapproved or malicious use of organization resources in last year’s Verizon Data Breach Investigations Report.

Read more ›

Posted in Cybersecurity, Hacks, Incident Response, Insider Threats, Legal, Malware, Malware & Other Threats, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , , , , , , ,

Healthcare and the Role of Cybersecurity

Cybersecurity: Healthcare Organizations Can Learn from Mistakes

Suhail Nanji – Director, Eastern Region SMLR Group, Inc.

Healthcare entities have a lot at stake when it comes to cybersecurity. Sensitive patient data released into the public sphere puts everyone on edge.

Read more ›

Posted in Content, Cybersecurity, Encryption, Governent Oversight, Hacks, HIPAA, Incident Response, Insider Threats, Malware, Malware & Other Threats, Privacy, Privacy Laws, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , , , ,

Hedge Funds and the Cybersecurity Question

Cybersecurity Threats Pose Real Danger To Hedge Fund Firms

from FINalternatives, May 19 2014

It is a near certainty that a cybersecurity breach will occur at some point at every asset management firm. However, with careful preparation, firms can take control over how damaging that breach may be. 

Read more ›

Posted in Compliance, Content, Cybersecurity, Financials, Incident Response, Insider Threats, Legal, Privacy Laws, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , ,

Unpatched Software? $150,000 HIPAA Fine

OCR Imposes HIPAA Penalty on Alaska Mental Health Provider

By , December 9, 2014. Follow Marianne @HealthInfoSec

Federal regulators are sending a powerful message about the importance of applying software patches by slapping an Alaska mental health services providers with a $150,000 HIPAA sanction.

Read more ›

Posted in Breach, Cloud, Compliance, Cybersecurity, Governent Oversight, HIPAA, Legal, Privacy, Privacy Laws, Vendor Compliance
Tags: , , , , , ,

BYOD and the ‘Kill Switch’ Debate

‘BYOD’ Smartphone Policies May Not Pay Off as Expected

by Steve Rosenbush, WSJ

New laws in California could complicate the way that companies manage bring-your-own-device programs. While nothing is likely to reverse the adoption of BYOD, in which employees connect their own smartphones, tablets and the like to a company’s IT infrastructure,

Read more ›

Posted in Compliance, Content, Cybersecurity, Encryption, Financials, Legal, Privacy, Privacy Laws, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , ,

Surveillance Environment Impacts the Way Companies do Business

“Snowden Effect” Causes Companies to Alter their Email Services

by Michael Hickins, Wall Street Journal

Business and consumer wariness of surveillance has pushed two of the world’s largest companies to make significant changes to their email services. Microsoft Corp. has decided to change its policies for accessing customer email after the company faced scrutiny for searching a user’s Hotmail email account to investigate a leak of company software,

Read more ›

Posted in Compliance, Encryption, Governent Oversight, Government Surveilance, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , ,

Privacy vs. Security: The Compliance Conundrum

Blackphone Could Create a Black Hole for Compliance

By: Ben DiPietro for the Wall Street Journal

The announcement this week of a smartphone that claims it doesn’t have a backdoor to allow access to law enforcement of intelligence agencies could create compliance problems for companies—while offering criminals a secure arena to conduct their illegal activities,

Read more ›

Posted in Compliance, Cybersecurity, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , ,

Insurer Sued Over Data Breach

Expert Predicts Healthcare Breach Suits Will Be Common in 2014
By , February 1, 2014. Follow Marianne @HealthInfoSec

A class action lawsuit has been filed against insurer Horizon Blue Cross Blue Shield of New Jersey in the wake of data breach late last year involving the theft of two unencrypted laptop computers that affected nearly 840,000 of its members.

Read more ›

Posted in Breach, Compliance, Cyber-Insurance, HIPAA, Legal, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: