Exploring the Cybersphere: September

This week in our blog, we offer a snapshot of cybersecurity, privacy and data security news of interest to the executive suite.  Periodically, we’ll recap insights from the growing cadre of voices in this space as well as lend our own views on the issues that impact executive governance of cyber risk and response. Many[…]

Rotten Apples?

Last December an article in Tech News World took a shot at forecasting the year ahead in cybersecurity. Among the predictions in the article was this from SentinelOne, a leading provider of endpoint protection, “Cybercriminals will train their gaze on Apple more often next year…An acceleration of those attacks is likely…because Apple continues to grow its[…]

Merited, But No Easy Answers to Cyber Info Sharing…

Last fall the Federal Bureau of Investigation took the historically notable step of issuing  a private warning to industry about a group of Chinese government hackers  that were stealing data from U.S. companies and government agencies. The FBI sent a nine page alert (http://www.slideshare.net/ragebeast/infragard-hikitflash) that said the Chinese hackers were using at least four “zero-day[…]

FTC Rings the Bell

̶  Ask not for whom the bell tolls, it tolls for thee. John Donne’s famous “Meditation XVII” offers a haunting reflection on humanity. It also serves as an apt reference for the meaning of the recent decision by the U.S. Court of Appeals for the 3rd Circuit upholding the Federal Trade Commission’s (FTC) authority to[…]