Join Us On LinkedIn

Get caught up with the Cybersecurity Docket News Wire for March 30, 2017.
Get caught up with the Cybersecurity Docket News Wire for March 29, 2017.
While some may view this as an exceptional case driven by its unique facts, the actions taken by Yahoo’s board and the company’s public disclosures underscore a more significant and noteworthy trend as it relates to the role of the legal function, corporate governance, in general, and cybersecurity, in particular. Namely, that cybersecurity issues continue to […]
Get caught up with the Cybersecurity Docket News Wire for March 28, 2017.
Get caught up with the Cybersecurity Docket News Wire for March 27, 2017.
Get caught up with the Cybersecurity Docket News Wire for March 26, 2017.
Get caught up with the Cybersecurity Docket News Wire for March 25, 2017.
Get caught up with the Cybersecurity Docket News Wire for March 24, 2017.
Get caught up with the Cybersecurity Docket News Wire for March 23, 2017.
Get caught up with the Cybersecurity Docket News Wire for March 22, 2017.
The New York Attorney General’s Office announced it received a record number of data breach notices in 2016. The office says it received 1,300 reported data breaches, that’s a 60 percent increase from the year before. The breaches exposed personal records of 1.6 million New Yorkers. via NY Attorney General: Record number of data breach […]
Get caught up with the Cybersecurity Docket News Wire for March 21, 2017.
We are only three months into the new year and yet we have a bunch of hacking tales to recount. And with three-fourths of the year spread out before us, if hackers maintain this hyper activity levels, 2017 could go down in history as one of the most notorious years for hacking, which usually results […]
Get caught up with the Cybersecurity Docket News Wire for March 20, 2017.
What does a broken windows cybersecurity policy look like in the corporate setting? There are three key elements: (1) employee education, (2) devoting sufficient resources to detecting minor infractions that are likely to be rooted in employee misconduct, and (3) a zero-tolerance policy on enforcing an appropriate response to identified infractions. via Implement a Cybersecurity […]