Crossroads Blog | CYBER SECURITY LAW AND POLICY

Profile Photo

Christopher FolkOffline

    Lessons Learned from Equifax

    In the wake of the Equifax Data breach and the litany of issues regarding potential insider stock sales, insecure database applications, and finger-pointing between Apache and Equifax, there are some valuable lessons we should all take heed of. Trust no one, and no entity: I hate to sound overly dire but even the old “trust, […]

    Read More

    Equifax Data Breach: Data of 143M Americans Breached

    Equifax Data Breach Impacts 143M Americans Lee Mathews reports in a Forbes article that Equifax discovered a breach on July 29th that could impact nearly half of the US population.  The article goes on to say that personally identifiable information (“PII”) such as social security numbers, birthdates, names,  addresses, and credit card numbers comprise approximately […]

    Read More

    Search Warrants: Plain View is less clear in a digital context

    A recent article in LegalTech news highlights the difficulty in applying the “plain-view” doctrine within the digital realm.  The article discusses web service provider Dream Host’s issues within the scope of search warrants related to data.  While the D.C. Circuit Court ruled that DreamHost had to comply with the search warrant, the arguments that DreamHost […]

    Read More

    Symantec: Internet Security Threat Report (ISTR) Vol. 22

    Symantec’s Internet Security Threat Report: Volume 22 [pdf-embedder url=”http://blog.cybersecuritylaw.us/wp-content/uploads/securepdfs/2017/08/ISTR22_Main-FINAL-APR24.pdf”] Some of the highlights from the Symantec Report include: The use of zero-day exploits and sophisticated malware is decreasing as malevolent actors are now focusing on traditional spear-phishing attacks and leveraging existing tools (e.g. built-in OS commands/utilities) Nation-States and targeted disruptive attacks: Symantec points to the […]

    Read More

    DEFCON Voting Hacks — Much Ado about Nothing (well kind of)

    DEFCON Convention: Voting Machine Hacks (Business Insider) According to an article by Sonam Sheth hackers at DEFCON were able to breach multiple voting machines within only minutes.  Sheth’s article states that hackers were able to infiltrate every single one of the thirty voting machines within just moments of having physical access and that even rudimentary […]

    Read More
    Please wait...

    Media