Tag: Cybersecurity
Tag: Cybersecurity
-
Colonial Pipeline and DarkSide: Cyber Attacks Have Real World Consequences
Cyber attacks can have real world consequences. Take, for example, an attempt by Russia-based hacking group DarkSide to extort money from Colonial Pipeline. By installing and executing ransomware on…
-
A Framework for Privacy Legislation
Privacy is en vogue. Policymakers from Washington, D.C. to Washington State are talking about it. They are holding meetings and proposing comprehensive legislation designed to control corporate access to, and…
-
Are You Secure? Really? How Do You Know?
Homeland security has been top of mind for state legislators for the last several years. Whether discussing and sharing best practices or understanding how to best protect the nation’s students…
-
Ensuring a Paper Trail for Elections
Most elections infrastructure in state and local governments are over a decade old. The aging electronic systems present unique threats that many state and local governments are not equipped to…
-
Hackers Target State Voter Databases: Are They Targeting Personal Information or Intending to Tamper with Elections?
As a number of people know by now, the Cyber Crimes Division of the Federal Bureau of Investigation (FBI) recently released a Flash memorandum warning state Boards of Elections…
-
Player Beware: Pokemon Go Can Place Your Personal Data at Risk
With great popularity comes great responsibility. Niantic and Nintendo have created an instantly successful smart phone app. With that instant success, though, comes significant risks, especially with the data Niantic…
-
Walmart v. Visa, Is the Retailer’s Suit about Protecting Customers or Money?
Is Walmart’s most recent lawsuit against Visa all about “protecting customers’ bank accounts,” or is Walmart using customer security as a trump card to hide the lawsuit’s financial motivations?…
-
No One Is Immune from Cyberattacks
No industry is “bulletproof” when it comes to cybersecurity measures. The conclusion comes from Verizon’s 2016 Data Breach Investigations Report. The Report analyzed over 64,000 incidents. The 64,000 incidents…
-
Federal Decision Threatens Apple Smartphone Encryption
A decision from a federal United States Magistrate Judge seriously threatens smartphone encryption by requiring Apple to build a “backdoor” to the iPhone for the Federal Bureau of Investigation…
-
Is Your Data Safe from the New Form of Government-Sanctioned Data Collection?
Electronic data can be revealing and intimate. Individuals should be secure and free from unreasonable government searches of their electronic data. When law enforcement engages in mass surveillance without appropriate…
-
Building a Better (Cyber) Wall
Perhaps Donald Trump is right. America needs to build a wall for better protection. The right type of wall, though, may not be physical. The wall needed is a “cyber” wall.
-
A Year in Review: The State of Cybersecurity
In early April, computer security firm Symantec released its annual Internet Security Threat Report, one of the most comprehensive sources of Internet threat data in the world. Symantec crowned…