Several reports indicate that an unidentified group of hackers are contacting unsuspecting victims with a threat to publish intimate materials from the victim if a ransom is not paid. The scam consists on revealing a real password used by the victim and thus catching the attention of the victim. The password is obtained from one of the previously hacked databases…
Panama City, Panama. April 2018. Panama hosted the International Forum on Law and New Technologies. Among the international speakers, Rafael Sosa spoke to hundreds of Panamanian judges and prosecutors about the challenges countries and the legal profession face on topics such as cyber security, cyber terrorism and the mounting volume of electronic evidence being generated and stored internationally. The forum was…
15 Elements of the 23 NYCRR 500 Cybersecurity Regulation from NY DFS As the first February reporting deadline approaches, here are 15 elements to consider for the most recent cybersecurity regulation by the New York State Department of Financial Services: Written Policies – Everything from information security, data governance, asset inventory, access controls, business continuity, and third-party vendor cybersecurity…
As companies attempt to create technological platforms or to mechanize operations, the dominant theme across the board seems to be the lack of understanding of the evolution in IT resources and the dramatic cost reductions it offers to enterprises looking to create or manage their IT departments. One possible explanation for this is the chasm that exists between management (business…