
The attack was executed by a botnet, called Mirai which is a collection of ‘captive’ devices, such as webcams and baby monitors. The botnet generated by tens of millions of IP addresses overloaded the system resulting in the massive outage.
The attack was executed by a botnet, called Mirai which is a collection of ‘captive’ devices, such as webcams and baby monitors. The botnet generated by tens of millions of IP addresses overloaded the system resulting in the massive outage.
Gideon Gartner, a former financial analyst of the Gartner, Inc. revealed its “Top Security Predictions 2016”
Recently, the US Federal government (in this case represented by the FBI) asked Apple Corporation to help them ‘crack’ the password of one of the iPhones used by a shooter in the December 2015 attack in San Bernadino attack where 14 people were killed and another 21 injured. Lawrence Dietz, Esq, TAL Global’s General Counsel and Managing Director, Information Security, examines the background, reasons and ramifications of the recent clash between the two powerful organizations.
The European Union Court of Justice issued a judgment on October 6, 2015 which declared the Safe Harbor Framework as invalid. While the long term effects of this ruling are far from clear, organizations that are doing business within the EU and those that are storing data about EU citizens and organizations need to be proactive to minimize the likelihood of problems with their international operations.
Knowing yourself is, indeed, a core requirement for any organization to protect its sensitive information and intellectual property. This is also the core motive in Naomi Fine’s book: Positively Confidential: 10 Proven Steps to Protecting Confidential Information, Private Data, and Intellectual Property in Today’s Interactive Business World.
The new NIST Special Publication 800-171 may offer organizations some good insight and guidance as to how to protect their sensitive information including Personally Identifiable Information (PII), Payment Card Industry (PCI), Personal Health Information (PHI), trade secrets and more.
On June 16, 2015, Larry Dietz, Esq., TAL Global’s General Counsel and Managing Director, Information Security, gave a presentation at the Cornerstones of Trust Conference, in Foster City, CA, titled: Cyber Bullying and Revenge Porn in the Workplace.
Dr. Erroll Southers, TAL Global’s Erroll Southers Managing Director for Counterterrorism and Infrastructure Protection, and Lawrence Dietz, Esq. TAL Global’s General Counsel & Managing Director, Information Security, explored last Friday a rarely examined aspect of cyber security, when they urged the audience at RSA USA 2015 Conference to consider the ways in which aircraft systems and networks could become weapons of war – aimed at the US and its allies.
TAL Global’s experts, Lawrence Dietz, Esq., and Dr. Erroll Southers, will present and discuss two relevant and innovative perspectives on information security at this year’s largest Information Security Conference – RSA USA 2015 Conference at the Moscone Center, San Francisco, CA, April 20-24.
With the significant and regular exposure Anonymous is getting, it is easy to make the mistake of assuming that most cyber attacks are motivated by ideology (including hacktivism and cyber espionage).