Category

Cyber Security

Apple, The FBI and You

Apple-FBI-Larry.jpg

Recently, the US Federal government (in this case represented by the FBI) asked Apple Corporation to help them ‘crack’ the password of one of the iPhones used by a shooter in the December 2015 attack in San Bernadino attack where 14 people were killed and another 21 injured. Lawrence Dietz, Esq, TAL Global’s General Counsel and Managing Director, Information Security, examines the background, reasons and ramifications of the recent clash between the two powerful organizations.

Continue Reading

Safe Harbor: The TAL Global Perspective

Lawrence_Dietz.jpg

The European Union Court of Justice issued a judgment on October 6, 2015 which declared the Safe Harbor Framework as invalid. While the long term effects of this ruling are far from clear, organizations that are doing business within the EU and those that are storing data about EU citizens and organizations need to be proactive to minimize the likelihood of problems with their international operations.

Continue Reading

Harnessing Ancient and Modern Writings to Protect Your Company’s Confidential Information

Positvely-Confidential.jpg

Knowing yourself is, indeed, a core requirement for any organization to protect its sensitive information and intellectual property. This is also the core motive in Naomi Fine’s book: Positively Confidential: 10 Proven Steps to Protecting Confidential Information, Private Data, and Intellectual Property in Today’s Interactive Business World.

Continue Reading

RSA 2015 – TAL Global Experts Shine a Light on the Unique Challenges of Cyber Security in Aviation

av-sec-small.jpg

Dr. Erroll Southers, TAL Global’s Erroll Southers Managing Director for Counterterrorism and Infrastructure Protection, and Lawrence Dietz, Esq. TAL Global’s General Counsel & Managing Director, Information Security, explored last Friday a rarely examined aspect of cyber security, when they urged the audience at RSA USA 2015 Conference to consider the ways in which aircraft systems and networks could become weapons of war – aimed at the US and its allies.

Continue Reading

Who is Watching You? Webcams in The Workplace

webcam-persons.jpg

Webcams in the workplace have become so ubiquitous that we don’t really pay attention to them anymore, just like we don’t pay attention to computer keyboards and monitors. Yet webcams can, and have, become a serious threat to privacy, confidentiality and intellectual property. They can be hijacked by hackers, criminals and cyber creeps, and they can be used to commit a variety of offenses, from invasion of privacy to blackmail, theft and industrial espionage. A nanny in Texas recently discovered that the baby monitor she’d used was actually under the control of a cyber Peeping Tom.

Continue Reading

© TAL Global, 2019