BreachExchange: by author

319 messages starting May 22 17 and ending May 30 17
Date index | Thread index | Author index


Audrey McNeil

What You Need to Learn from the Biggest Cyber Attack in History Audrey McNeil (May 22)
Cybersecurity is one of the top risks organizations must manage in 2017 Audrey McNeil (May 03)
One in five UK companies hacked by cyber criminals, research shows Audrey McNeil (Apr 19)
Corporate Cybersecurity Can Only Be as Strong as Your Weakest Link Audrey McNeil (Apr 11)
The mouse that roared Audrey McNeil (Jun 09)
Dealing with a data breach Audrey McNeil (May 01)
3 Barriers To Cybersecurity Success And How To Overcome Them Audrey McNeil (Apr 10)
In-House Advice for Tackling Data Security Risks Audrey McNeil (Jun 16)
Athletes’ medical data at risk after IAAF suffers alleged Fancy Bears cyber attack Audrey McNeil (Apr 04)
Wonga data breach could affect nearly 250, 000 UK customers Audrey McNeil (Apr 11)
Year 2016 Was Biggest Yet for HIPAA Privacy Enforcement Audrey McNeil (Apr 19)
Cybercrime and Data Breach a Rising Threat to All Employers Audrey McNeil (Apr 06)
Humans: The weakest link in social engineering and cyber attacks Audrey McNeil (May 23)
Who’s Handling Your Data?: Vendor Risk Management Audrey McNeil (Apr 21)
Why some firms never fall victim to cyber-attacks - while their competitors do Audrey McNeil (Jun 14)
Healthcare systems are the target of choice for ransomware Audrey McNeil (Apr 19)
Use of big data analytics in cyber security Audrey McNeil (Jun 20)
From botnet to malware: A guide to decoding cyber security buzzwords Audrey McNeil (Jun 05)
Why Cyber Attacks Will Continue until Prevention Becomes a Priority Audrey McNeil (May 09)
Defending Against Social Engineering Attacks Audrey McNeil (Apr 18)
How to protect against cyber threats Audrey McNeil (May 15)
Ways To Protect Passwords from Hackers Audrey McNeil (May 05)
8 Tips on Cyber Security for Staffing Companies Audrey McNeil (May 05)
Singapore extends cybercrime laws to include firms that use breached data Audrey McNeil (Apr 05)
Security Think Tank: Apply risk-based approach to patch management Audrey McNeil (Jun 27)
Cyber-resilience - a repeated regulatory message Audrey McNeil (May 12)
'Distributed Cybercrime' Is Making Attackers Multi-Millionaires Audrey McNeil (Apr 06)
IT disaster recovery failures: why aren’t we learning from them? Audrey McNeil (Apr 03)
Mobile security in hospitals: A piece of the improved outcomes puzzle Audrey McNeil (Apr 12)
Enabling a "Secure Summer Mindset" for Employees Audrey McNeil (Jun 30)
Securing Your Digital Future: Cyber Trust As Competitive Advantage Audrey McNeil (Apr 24)
Prevention is better than cure for cyber security Audrey McNeil (Apr 12)
CA agency reports ADAP data breach Audrey McNeil (Apr 28)
Why all businesses need an incident response plan Audrey McNeil (Apr 05)
Woman Finds Piles Of Secret NASA And Martin Marietta Documents In Trash Outside Her Florida Home Audrey McNeil (Jun 20)
HHS Report Urges Health Care Industry to Address Cybersecurity Risks Audrey McNeil (Jun 20)
Maryland woman gets 5+ years for widespread identity theft of Freddie Mac employees Audrey McNeil (May 23)
Tips to Help a Business Avoid Data Breach Litigation Audrey McNeil (May 10)
The Widening Data Breach Standing Split: Fourth Circuit Finds No Standing From Increased Risk of Future Identity Theft Audrey McNeil (Apr 11)
How Boards Can Prioritize Cybersecurity in Corporate Governance Audrey McNeil (Apr 10)
The new marketing laws that your business needs to act on NOW Audrey McNeil (Apr 28)
The next ransomware attack will be worse than WannaCry Audrey McNeil (May 17)
‘New era’ in data protection as changes loom Audrey McNeil (Apr 13)
Cyber Security Facts That Need To Be Seen To Be Believed Audrey McNeil (May 31)
Second Circuit Affirms Dismissal of Data Breach Class Action for Failure to Allege Actual Injury Audrey McNeil (Jun 06)
Best Practices for Incident Response Plans Audrey McNeil (May 10)
Small Healthcare Provider Pays $31, 000 for Failing to Have a Business Associate Agreement With File Storage Vendor Audrey McNeil (Apr 28)
3 Lessons Companies Can Learn from the Data Breaches that Cost Yahoo $350 Million Audrey McNeil (Apr 06)
A New Internal Threat to Your Environment? ‘Checkbox Security’ Audrey McNeil (May 31)
Don't WannaCry: Ten Questions Boards and Company Management Can Ask in the Wake of Recent Ransomware Attacks Audrey McNeil (May 23)
Ransomware And Retail Audrey McNeil (May 10)
Guardian Soulmates website hacked as dating data breached Audrey McNeil (May 09)
The role of continuity practices in surviving ransomware Audrey McNeil (Apr 07)
20 Million Reasons for C-Suite to pay Attention to Data Loss Audrey McNeil (Jun 13)
Five Pitfalls of Cybersecurity Insurance: Lessons from the United States Audrey McNeil (May 01)
Scottrade hit with new class action suit over 2013 Data Breach Audrey McNeil (May 10)
University of Louisville: Tax information of some employees hacked Audrey McNeil (Apr 11)
7 Simple Business Security Tips From Her Majesty's Secret Service Audrey McNeil (Jun 08)
Brooks Brothers Discloses Year-Long Data Breach Audrey McNeil (May 16)
Tax worker fired after biggest privacy breach at Revenue Canada Audrey McNeil (May 23)
Data Loss Prevention and Cybersecurity: A Practical Guide Audrey McNeil (Jun 14)
Top 7 Questions to Ask Your Vendors about Their Security Policies Audrey McNeil (Apr 03)
How to Keep Your Customers’ Data Secure Audrey McNeil (May 03)
Don’t be a fool about endpoint protection Audrey McNeil (Apr 07)
Acting On Data Protection Audrey McNeil (Jun 21)
The Reputation Impact of Data Breach. Audrey McNeil (Apr 06)
Bell Canada hacked: 2m account details swiped by mystery miscreants Audrey McNeil (May 17)
What do we learn about clandestine operators from the Shadow Brokers leak? Audrey McNeil (Jun 21)
Privacy and security: Should you pay ransom to recover your corporate data? Audrey McNeil (May 09)
A Week Later, Hacked Spyware Vendors Haven't Warned Their 130, 000 Customers Audrey McNeil (Apr 28)
What Level of Security Does Your Business Really Need? Audrey McNeil (Apr 24)
Defence at the frontline: The importance of cyber education Audrey McNeil (May 02)
Appeal in Home Depot Data Breach Derivative Action Results in Settlement of Corporate Governance Claims Audrey McNeil (May 03)
How Will a Data Breach Affect Your Brand? Audrey McNeil (May 12)
Six Tips to Consider in Hiring Privacy and Data Security Experts Audrey McNeil (Apr 24)
Cyber Insurance Becomes a Must for More Manufacturers Audrey McNeil (Apr 18)
McDonald's Canada reveals hack of careers website Audrey McNeil (Apr 03)
5 best practices to avoid the pain of a health care data breach Audrey McNeil (Jun 21)
Are you also keeping your front door open for hackers? Audrey McNeil (May 05)
Canada - Province mailed private information to strangers Audrey McNeil (May 05)
The Myth of Cyber-Security Audrey McNeil (Apr 18)
The eyes have it: How to prevent visual hacking in financial institutions Audrey McNeil (May 26)
Encryption for Data Safety and Practice Success Audrey McNeil (Jun 09)
Northrop Grumman can make a stealth bomber – but can't protect its workers' W-2 tax forms Audrey McNeil (Apr 25)
These Are 10 Cybersecurity Myths That Must Be Busted Audrey McNeil (Apr 05)
Cybersecurity in 2025: the skills we'll need to tackle threats of the future Audrey McNeil (Apr 07)
Latest Target Data Breach Settlement Reminds Companies Of The Importance Of Data Security Audrey McNeil (May 31)
Gannett Sends Letters to Employees Warning of Potential Data Breach Audrey McNeil (May 03)
Identity thieves used stolen data 9 minutes after it was posted online Audrey McNeil (May 30)
How cybercriminals use the deep and dark web to target financial organisations Audrey McNeil (Jun 27)
Shifting (cyber)world order Audrey McNeil (May 02)
A CSO’s Guide to Insider Threats Audrey McNeil (Jun 23)
Deep Learning's Growing Impact on Security Audrey McNeil (Jun 14)
Top 10 cybersecurity best practices Audrey McNeil (Apr 12)
Massive data breach exposes over 16, 000 concealed weapons permit holders in Florida Audrey McNeil (May 24)
Why malware is still the beating heart of cybercrime Audrey McNeil (May 05)
The realities of data breach litigation today Audrey McNeil (Apr 21)
Nayana ransom payment a wake-up call for cyber hygiene Audrey McNeil (Jun 26)
Wiretapping Is a Threat to Small Businesses -- Here's How to Protect Yourself Audrey McNeil (Jun 13)
Business not taking cyber security seriously enough, says Dido Harding Audrey McNeil (May 22)
Once More unto the Breach: Practical Tips When Employee Data is Compromised Audrey McNeil (Jun 06)
4 Reasons Why Cyber Insurance Is Good for Small Business Audrey McNeil (May 03)
Customers Question Breach Alert Etiquette at Blowout Cards Audrey McNeil (Apr 26)
Pediatric Group Reports Ransomware Attack Impacting 55,000 Patients’ Data Audrey McNeil (Apr 07)
These are the Top 10 Worst Foreign Countries in which to Suffer a Data Breach Audrey McNeil (Apr 24)
Security Implications of Outsourcing Audrey McNeil (Jun 09)
Health information of nearly 1, 200 compromised after website hack at Prairie Mountain Health Audrey McNeil (Jun 05)
Avoiding a data disaster: could your business recover from human error? Audrey McNeil (May 24)
Disclosure of a Single Patient’s PHI Leads to Hefty $2.4 Million Settlement Audrey McNeil (May 18)
Actions Small Businesses Can Take to Prevent Cyber-Attacks Audrey McNeil (May 15)
4 Security Questions to Ask When Outsourcing IT Operations to Make Sure Your Business Isn't at Risk Audrey McNeil (Apr 04)
Who are we kidding? WannaCry is not a first Audrey McNeil (May 18)
The one major blind spot in most cyber risk strategies Audrey McNeil (Apr 28)
Is HIPAA Outdated? While Coverage Gaps and Growing Breaches Raise Industry Concern, Others Argue HIPAA is Still Effective Audrey McNeil (Apr 12)
Information Theft: Don’t Help the Cyber Criminals Audrey McNeil (Jun 05)
Class-action suit filed alleging Chipotle's 'elementary' security, negligence led to data breach Audrey McNeil (May 23)
Car parking app shares 2000 customers' private details after company suffers glitch Audrey McNeil (Apr 18)
Respond to ransomware in three steps: secure, assess, recover Audrey McNeil (May 01)
Trade Secrets 2.0 Audrey McNeil (Jun 20)
Ransomware: The 7 Stages Of Grief And How Companies Should Cope Audrey McNeil (Apr 13)
WannaCry? You’re Not Alone: The 5 Stages of Security Grief Audrey McNeil (Jun 23)
Details of some 450, 000 Dutch lottery players accessible to hackers Audrey McNeil (Apr 04)
What went down and what can be learned from the biggest data breaches of 2016 Audrey McNeil (Apr 10)
8 Essential Steps To Protect Your Business From Cyber Security Threats Audrey McNeil (Jun 28)
Ashley Madison blackmailers threaten to create Cheater’s Gallery exposing members who don’t pay up Audrey McNeil (Apr 26)
Why advertising and media agencies are so appealing – and vulnerable – to hackers Audrey McNeil (Jun 30)
Terrified about cyber ninjas? You may be missing the real threat Audrey McNeil (Apr 21)
Why and how businesses should protect against data breaches from within Audrey McNeil (Apr 25)
Kimpton Data Breach Decision Highlights Lingering Confusion on Standing Issues Audrey McNeil (Apr 26)
Why the UK needs to adopt US healthcare approaches to information security sharing Audrey McNeil (May 18)
It’s time to think differently about cyber security. Here’s how Audrey McNeil (Jun 23)
What Compliance Needs to Know About Data Privacy and Security Audrey McNeil (Apr 28)
Link Cybersecurity to Business Outcomes Audrey McNeil (Jun 16)
The World Is Getting Hacked. Why Don’t We Do More to Stop It? Audrey McNeil (May 16)
Chicago trader gets 1 year in prison for stealing ex-employer's computer code Audrey McNeil (Jun 06)
How to Operationalize Security with Enterprise-Wide Engagement Audrey McNeil (Apr 12)
United Airlines cockpit codes accidentally leaked Audrey McNeil (May 16)
The Importance of Protecting Personally Identifiable Information (PII) Audrey McNeil (Jun 08)
Massive privacy breach at Public Services reveals workers' salaries Audrey McNeil (Jun 05)
What does it mean to be "hacked?" Audrey McNeil (Apr 11)
4 Glaring Security Issues Placing Data at Risk Audrey McNeil (May 05)
Identifying and Overcoming Cybersecurity Risks: 5 Steps Audrey McNeil (Jun 21)
4 Steps Advisors Should Take After a Cyber Attack Audrey McNeil (May 31)
Why Your Business Needs A Security Operations Center Audrey McNeil (May 12)
Risk assessments for local governments and SMBs Audrey McNeil (May 24)
HIPAA: It’s not as black and white as you first thought Audrey McNeil (May 24)
An Increased Cyber Attack Surface Area Audrey McNeil (Apr 10)
The ins and outs of risk managing a breach Audrey McNeil (Jun 14)
Preparing for Ransomware Attacks: Your Company Is a Target Audrey McNeil (Apr 07)
The lessons you need to learn from the Yahoo data breach: Top four info security tips Audrey McNeil (May 30)
Why resilience should be central to cybersecurity Audrey McNeil (Jun 14)
How to step up your cyber security game Audrey McNeil (May 22)
Lone consumer holds up Target data breach settlement Audrey McNeil (May 22)
Cyber insurance claims: What happens when a breach occurs? Audrey McNeil (Jun 23)
UK: Cyberattack hits 26, 000 Debenhams Flowers customers Audrey McNeil (May 08)
The Internet of Things and the Threat it Poses to GDPR Compliance Audrey McNeil (Jun 23)
Data Breaches and the Significance of Outside Counsel Audrey McNeil (May 26)
2nd Circuit hears data breach argument: Is fear of harm sufficient for Article III standing? Audrey McNeil (Apr 03)
The five biggest IT threats to your firm’s GDPR compliance Audrey McNeil (Jun 13)
For True Cybersecurity, Executives Must Become Hands-On Audrey McNeil (Apr 25)
The economics and impact of bad CISO leadership Audrey McNeil (Jun 28)
Threat to the auto industry from hackers Audrey McNeil (May 18)
Heaps of Windows 10 internal builds, private source code leak online Audrey McNeil (Jun 27)
Data Breach Digest: Planning for a data breach in a post-GDPR world Audrey McNeil (Apr 03)
HIPAA Spring Check-Up: Your Obligations to Safeguard Third-Party Patient Health Information in Medical Records Produced in Litigation Audrey McNeil (May 30)
Despite DocuSign promises, they couldn’t avoid the inevitable Audrey McNeil (May 26)
Do Healthcare Data Breach Lawsuits Have Reasonable Standards? Audrey McNeil (Apr 13)
A Ransom Note From Your Coffee-Machine Is No Joke, But It's Not The Only Threat Audrey McNeil (Apr 10)
Utilizing Strong Cyber Hygiene for Ransomware Preparation Audrey McNeil (May 26)
Hollywood Studio Hit By Cyber Extortion Says: 'Don't Trust Hackers' Audrey McNeil (Jun 26)
What HR Can Do to Protect Against Cyber Threats Audrey McNeil (Jun 28)
Risk of Data Breaches at Hospitals Is Greater at Larger Facilities and Those with Major Teaching Mission, Johns Hopkins Researcher Finds Audrey McNeil (Apr 06)
New perspectives on cyber security: The regulatory challenge Audrey McNeil (May 31)
Why we need to encrypt everything Audrey McNeil (Apr 13)
The high cost of cybercrime Audrey McNeil (Jun 13)
Threats to information security Audrey McNeil (Jun 27)
Alabama’s online site for crime records sometimes includes victim information Audrey McNeil (May 01)
Facebook mistakenly reveals moderators to 'terrorists' Audrey McNeil (Jun 19)
Red Cross thankful for loyal donors after data breach Audrey McNeil (May 08)
What’s at Stake When Government’s Data Is Stolen Audrey McNeil (May 24)
Neiman Marcus data breach settlement tells us plenty about the ROI of security Audrey McNeil (Apr 04)
Button up Your Business Associates Agreements or Pay the Price Audrey McNeil (May 12)
Japan sees surge in demand for cyber insurance as attacks increase Audrey McNeil (Jun 27)
Feds fine a community health network for HIPAA violations Audrey McNeil (Apr 19)
Health IT company pays $130, 000 to resolve delayed data breach notification Audrey McNeil (Jun 16)
Four best practices in responding to a security breach Audrey McNeil (Apr 18)
Regulators enlist corporate lawyers in joint response to cyberattacks Audrey McNeil (Jun 27)
It’s Time CIO’s Get Real About Data Security Audrey McNeil (Jun 09)
One arrested, thousands more potential PharmaNet privacy breaches Audrey McNeil (Apr 05)
Managing the effects of 'Crime-as-a-Service' within healthcare Audrey McNeil (Jun 21)
Data Security, the Biggest Problem for Enterprise Audrey McNeil (May 31)
Why businesses face high risk of cyberattacks during tax season Audrey McNeil (Apr 04)
How small businesses can protect against data breaches from within Audrey McNeil (May 24)
Ohio Appellate Court dismisses privacy breach lawsuit against employer Audrey McNeil (May 12)
Ransomware and HIPAA- What You Need to Know to Stay Secure Audrey McNeil (May 15)
4 Ways To Protect Your Business During Major Transactions Audrey McNeil (May 02)
A clean bill of health for data security Audrey McNeil (May 02)
What are the GDPR requirements? Audrey McNeil (Jun 30)
LinkedIn hacker accused of exposing 100 million users faces extradition trial and 30 years jail Audrey McNeil (Apr 06)
Cyber Attack Could Spark Lawsuits but Not Against Microsoft Audrey McNeil (May 17)
The First 24 Hours: How to Prepare and Respond to a Major Cybersecurity Attack Audrey McNeil (May 17)
Will New Cybersecurity Legislation Offer Better Protection for Consumers? Audrey McNeil (May 10)
Ethical hacking: The Zomato case highlights how the government should use bug bounty programmes Audrey McNeil (Jun 05)
Pwned UK SME fined £60K for leaving itself vulnerable to hack attack Audrey McNeil (Jun 28)
Neiman Marcus: 2015 Breach Exposed Full Card Details Audrey McNeil (Apr 19)
NCDMV's Raleigh office discloses possible information breach for 24, 000 customers Audrey McNeil (Apr 05)
Qantas data breach reveals customer details Audrey McNeil (Apr 05)
CIOs Coming To Terms With Fear Of Cloud Security Audrey McNeil (Apr 21)
Security Think Tank: Employees are one of the greatest defences Audrey McNeil (May 30)
‘Wholesale disregard for customers’ privacy’: Bose Corp sued over spying headphone app Audrey McNeil (Apr 21)
MDLive hit with class-action lawsuit over patient privacy issues Audrey McNeil (Apr 26)
Is Your Company’s Crisis Communications Plan Prepared for Cybersecurity Incidents? Audrey McNeil (May 08)
Prevent data breaches, don’t just report them Audrey McNeil (May 15)
The anatomy of a ransomware attack – keeping your organisation immune Audrey McNeil (Jun 28)
The Wide-Ranging Impact of New York's Cybersecurity Regulations Audrey McNeil (May 17)
With cyber attacks on the rise, business continuity plans are more vital than ever Audrey McNeil (May 02)
Top Sony exec has some advice for ransomware victims Audrey McNeil (May 18)
TalkTalk Hack: Two Men Plead Guilty Audrey McNeil (May 01)
Bracing for the Future of Information Security Threats Audrey McNeil (Apr 07)
Cybersecurity Steps Every Lawyer Should Consider Audrey McNeil (Jun 30)
Small businesses increasingly in cybercriminal crosshairs Audrey McNeil (May 01)
Hipchat was hacked over the weekend, and it’s bad Audrey McNeil (Apr 25)
Learning the lessons from cyber attacks Audrey McNeil (Jun 26)
Cybersecurity Training Often a Tangled Web Audrey McNeil (Jun 30)
Fashion Retailer Buckle Finds Malware on PoS Systems Audrey McNeil (Jun 20)
There’s Simply No Such Thing as “Good Enough” in Cyber Security Audrey McNeil (May 03)
HIT Think How small healthcare providers can toughen cyber defenses Audrey McNeil (Apr 04)
Recent HIPAA Privacy and Security Settlements and Lessons Learned Audrey McNeil (Apr 11)
4 pitfalls to avoid in a cyber insurance policy Audrey McNeil (Apr 18)
Cybercrime is biggest threat to SMEs ‘by far’, says Federation of Small Business policy chief Audrey McNeil (May 09)
Sun Tzu's 'The Art of War' for Cybersecurity Audrey McNeil (Jun 05)
Malvertising Targets Your Online Users Audrey McNeil (Apr 25)
India: In A Shocking Breach, Aadhaar Details Of A Million Pensioners Leaked In Jharkhand Audrey McNeil (Apr 25)
Litigation Alert: Second Circuit Limits Standing to Bring Data Breach Class Actions Audrey McNeil (May 15)
Is Big Data Security Still Lacking? Audrey McNeil (May 02)
Preventing Your Endpoints from Turning into Weak Points Audrey McNeil (Apr 13)
Employer Liability for Data Breaches: Where Are We Now? Audrey McNeil (Apr 12)
Arm your organization with an effective cybersecurity posture Audrey McNeil (Jun 30)
Victorian Education dept accidentally publishes parent and student details online Audrey McNeil (Apr 13)
Cyber Crime – Can Locard’s Exchange Principle Be Applied to Cyber Crime? Audrey McNeil (Jun 13)
Why are Businesses still Taking Unnecessary Risks with Cybersecurity? Audrey McNeil (Jun 14)
Cyber Crimes and Data Breaches Go Rampant Audrey McNeil (Apr 10)
Digital organizations face a huge cybersecurity skills gap Audrey McNeil (Jun 21)
How to prevent an employee stealing confidential information Audrey McNeil (May 18)
Putative Data Breach Class Action Dismissed for the Third Time Audrey McNeil (Jun 23)
A CMO-CIO Alliance Is An Organization’s Best Defense Against Hackers Audrey McNeil (May 23)
Yahoo Fails to Cooperate with Hack Probe, Says German Cyber Agency Audrey McNeil (May 12)
Helping SMEs safeguard their business against cyber-attacks Audrey McNeil (Jun 13)
UK businesses concerned about cyber-risks linked to smart energy tech Audrey McNeil (May 09)
As long as the workforce is human, IT security education will fall short Audrey McNeil (May 08)
Cyber crime attacks reputations as well as systems Audrey McNeil (Apr 26)
Cybercrime Is A Growing Threat To All Employers Audrey McNeil (Apr 26)
If you've stayed at a Holiday Inn you may have lost more than a good night's sleep (like maybe your bank card) Audrey McNeil (Apr 21)
WannaCry Ransomware Cyberattack Raises Legal Issues Audrey McNeil (May 26)

Destry Winant

Proposed 'Hack Back' Bill Still in the Works, but Remains Contentious Destry Winant (Jun 02)
Going Beyond Regulation Destry Winant (Jun 12)
DDoS Attacks Surge, Organizations Struggle to Respond Destry Winant (May 04)
WannaCry Hack Ported to Infect Windows 10 Destry Winant (Jun 08)
Target in $18.5 million multi-state settlement over data breach Destry Winant (May 25)
Can Law Firms Sue NSA for Data Breaches? Lawyers Say Good Luck Destry Winant (Jun 29)
Three approaches to strategic data management: Good, better and best Destry Winant (Jun 12)
Osaka teen first alleged ransomware maker arrested in Japan Destry Winant (Jun 08)
Cyber crime as a service forces changes in information security Destry Winant (Apr 27)
How IT leaders can get everyone involved in cybersecurity Destry Winant (May 04)
Over a Third of Security Pros Bypass Their Own Corporate Security Settings Destry Winant (May 11)
Now tech support scams are exploiting WannaCry ransomware fears Destry Winant (May 25)
The WhatsApp-Facebook case will determine India’s online privacy laws Destry Winant (May 19)
China's New Cybersecurity Law and Draft Data Localization Measures Expected to Burden Multinational Companies Destry Winant (May 11)
Tech-Savvy Innovative Hotels Are More Vulnerable to Data Breaches Destry Winant (May 04)
Paid in the USA: Americans more likely to pony up when infected with ransomware Destry Winant (Apr 27)
Consumer Genetic Testing: Beginning to Assess Privacy Practices Destry Winant (Jun 02)
HHS is considering changes to OCR’s 'wall of shame'—and experts are divided on the impact Destry Winant (Jun 15)
Tennessee Adds Technical Requirements to its Data Breach Notification Laws Destry Winant (Apr 27)
Cyber security: an ‘indigestion problem’ in healthcare industry Destry Winant (May 11)
Security Pros 'Prefer' Root Canal Surgery Over Informing Board of Breaches Destry Winant (Jun 22)
What Not to Do After a Data Breach Destry Winant (Jun 22)
United States: Recent Updates To State Data Breach Notification Laws In New Mexico, Tennessee, Virginia Destry Winant (May 04)
Medical Devices Reportedly Infected in Ransomware Attack Destry Winant (May 19)
Account takeovers spreading, becoming big threat to corporate security Destry Winant (Jun 22)
Your Greatest Asset Isn’t Your People — It’s the Data About Your People Destry Winant (Jun 15)
OneLogin security chief reveals new details of data breach Destry Winant (Jun 08)
OU shuts down file sharing service after failing to protect thousands of students' records Destry Winant (Jun 15)
Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers Destry Winant (Jun 01)
PLASTIC SURGERY BLACKMAIL VICTIMS URGED NOT TO PAY HACKERS Destry Winant (Jun 01)
You're Going to Be Hacked. Here's How to Tell Everyone Without Destroying Your Company Destry Winant (Jun 15)
MSPs: Protect Yourself and Customer Endpoints Through Layered Security Destry Winant (Jun 01)
Ransomware Attacks: When Is Notification Required? Destry Winant (Apr 27)
Election candidates warned about phishing attempts Destry Winant (May 19)
National ATM Council announces 2017 Retail ATM Skimming Survey results – Responds to recent FICO clarification Destry Winant (May 11)
This Ukrainian Company Is Likely Behind the Ransomware Wave Destry Winant (Jun 29)
Is protected health information safe in the cloud? Destry Winant (May 19)
How to spot and prevent insider threats Destry Winant (Jun 29)
I admit it, I'm a cyber security professional and I fell for a phishing email Destry Winant (Jun 12)
Canceled: Crowdfunding to Pay Shadow Brokers for Exploits Destry Winant (Jun 02)
Unprotected web applications: The new security frontier. So reprioritise Destry Winant (Jun 29)
UK public no longer trusts online businesses with its data Destry Winant (May 19)
Why end users should never be held responsible for cyber attacks Destry Winant (Jun 15)
Sears Announces Kmart Malware Attack - Says EMV 'Chip' Payment System Prevented Large Scale Fraud Destry Winant (Jun 02)
How the Trump Budget Would Fund Cybersecurity Destry Winant (May 25)
Five Tips for Training Employees on Effective Cybersecurity Practices Destry Winant (Jun 22)
Massive Data Breaches, Billions in Wasted Funds: Who Is Holding Edtech Vendors Accountable? Destry Winant (May 25)
Do You Even Know What Cyber Defense Is? Destry Winant (Jun 22)
Has Spotify been hacked? Firm denies breach as thousands of alleged passwords leak Destry Winant (May 25)

Inga Goddijn

Twitter says Vine users’ emails and phone numbers were exposed for a day, but weren’t misused Inga Goddijn (May 22)
Lack of Encryption Causes Dallas Emergency Siren Hack Inga Goddijn (Apr 14)
Anthem to pay record $115 million to settle U.S. lawsuits over data breach Inga Goddijn (Jun 26)
Senator Probes Top US Defense Contractor Over Leaked Data Tied to Pentagon Project Inga Goddijn (Jun 23)
Nintendo offers hackers up to $20, 000 to find Switch and 3DS security flaws Inga Goddijn (Apr 14)
Mandatory Notice Requirements under PHIPA and Public Consultation on Proposed Regulation Regarding Notices to the Commissioner Inga Goddijn (Apr 14)
Coca-Cola Dodges Privacy Class Action Inga Goddijn (Apr 14)
£42bn: The damage to UK investors from 'severe' cyberattacks since 2013 Inga Goddijn (Apr 14)
Yes, You Should Be Concerned about Rogue Employees (and Here’s Why) Inga Goddijn (Jun 02)
Chipotle Warns Customers of Possible Credit Card Breach Inga Goddijn (Apr 27)
WannaCry Wakeup Call Not Heard? Inga Goddijn (Jun 27)
HOW TO MAKE THE MOVE TO THE CLOUD SECURELY Inga Goddijn (Apr 03)

Richard Forno

Data on 198M voters exposed by RNC contractor Richard Forno (Jun 20)
Password manager OneLogin hacked, exposing sensitive customer data Richard Forno (Jun 02)
Anthem to data breach victims: Maybe the damages are your own darned fault Richard Forno (Apr 19)
Chipotle says hackers hit most restaurants in data breach Richard Forno (May 30)