The European Union Court of Justice issued a judgment on October 6, 2015 which declared the Safe Harbor Framework as invalid. While the long term effects of this ruling are far from clear, organizations that are doing business within the EU and those that are storing data about EU citizens and organizations need to be proactive to minimize the likelihood of problems with their international operations.

Continue Reading

Knowing yourself is, indeed, a core requirement for any organization to protect its sensitive information and intellectual property. This is also the core motive in Naomi Fine’s book: Positively Confidential: 10 Proven Steps to Protecting Confidential Information, Private Data, and Intellectual Property in Today’s Interactive Business World.

Continue Reading

The new NIST Special Publication 800-171 may offer organizations some good insight and guidance as to how to protect their sensitive information including Personally Identifiable Information (PII), Payment Card Industry (PCI), Personal Health Information (PHI), trade secrets and more.

Continue Reading

On June 16, 2015, Larry Dietz, Esq., TAL Global’s General Counsel and Managing Director, Information Security, gave a presentation at the Cornerstones of Trust Conference, in Foster City, CA, titled: Cyber Bullying and Revenge Porn in the Workplace.

Continue Reading

Dr. Erroll Southers, TAL Global’s Erroll Southers Managing Director for Counterterrorism and Infrastructure Protection, and Lawrence Dietz, Esq. TAL Global’s General Counsel & Managing Director, Information Security, explored last Friday a rarely examined aspect of cyber security, when they urged the audience at RSA USA 2015 Conference to consider the ways in which aircraft systems and networks could become weapons of war – aimed at the US and its allies.

Continue Reading

TAL Global’s experts, Lawrence Dietz, Esq., and Dr. Erroll Southers, will present and discuss two relevant and innovative perspectives on information security at this year’s largest Information Security Conference – RSA USA 2015 Conference at the Moscone Center, San Francisco, CA, April 20-24.

Continue Reading

With the significant and regular exposure Anonymous is getting, it is easy to make the mistake of assuming that most cyber attacks are motivated by ideology (including hacktivism and cyber espionage).

Continue Reading

Webcams in the workplace have become so ubiquitous that we don’t really pay attention to them anymore, just like we don’t pay attention to computer keyboards and monitors. Yet webcams can, and have, become a serious threat to privacy, confidentiality and intellectual property. They can be hijacked by hackers, criminals and cyber creeps, and they can be used to commit a variety of offenses, from invasion of privacy to blackmail, theft and industrial espionage. A nanny in Texas recently discovered that the baby monitor she’d used was actually under the control of a cyber Peeping Tom.

Continue Reading

There are a great many pundits at work purporting to analyze the significance of the hack on The US Central Command (CENTCOM)’s Twitter account. This was not a highly orchestrated and technical attack, but an attack directed at a consumer social network. The real message is not that ISIS has a great cyber force, but that the consumerisation of the workplace can lead to serious unwanted consequences.

Continue Reading

KIM Jong Un and You

On December 19, 2014 By

A series of cyber attacks attributed to the Hermit Kingdom also known as the Democratic People’s Republic of Korean (DPRK) and more commonly called North Korea, has caused Sony Pictures to cancel the release of their new ‘comedy’ “The Interview”. The film is based on a fictional scenario wherein the CIA recruits an American TV personality to kill the ruler of North Korea.

What does all this mean to you?

Continue Reading