Jump to content
Prof. Snyder's Courses

All Activity

This stream auto-updates     

  1. Last week
  2. A Better Way to Teach Cybersecurity to Workers (WSJ): Companies have found out that punishing employees for poor cyber hygiene is not effective, according a recent report in the Wall Street Journal. The general consensus is that most people dread cyber security training. Instead, companies are making progress when switching out the stick for the carrot, […] View the full article
  3. Earlier
  4. In the wake of the Equifax Data breach and the litany of issues regarding potential insider stock sales, insecure database applications, and finger-pointing between Apache and Equifax, there are some valuable lessons we should all take heed of. Trust no one, and no entity: I hate to sound overly dire but even the old “trust, […] View the full article
  5. In the wake of the Equifax Data breach and the litany of issues regarding potential insider stock sales, insecure database applications, and finger-pointing between Apache and Equifax, there are some valuable lessons we should all take heed of. Trust no one, and no entity: I hate to sound overly dire but even the old “trust, […] View the full article
  6. In the wake of the Equifax Data breach and the litany of issues regarding potential insider stock sales, insecure database applications, and finger-pointing between Apache and Equifax, there are some valuable lessons we should all take heed of. Trust no one, and no entity: I hate to sound overly dire but even the old “trust, […] View the full article
  7. Growing Cybersecurity Threat Projected to Push Cybersecurity Market to New Highs (Business Insider): The cybersecurity market size is expected to reach $231.94 billion by 2022, an approximate 160% increase from its current size of $137.85 billion, according to a recent Business Insider article. The article summarizes a Markets and Markets research report, indicating security types […] View the full article
  8. Hackers’ Latest Weapon: Cyber Extortion (WSJ): Nefarious actors in cyber space have another tool in their toolbox. Hackers are not just stealing information or holding it ransom, an article in the Wall Street Journal says, but are now digging for sensitive information that could be used to extort companies and their executives. The article explains that […] View the full article
  9. Equifax Blames Apache –> Apache rebuts; in the end Consumers still Lose Equifax appears to be blaming a vulnerability in the Apache Software Foundation’s Apache Struts Web Framework, according to a post on Apache.org. The Apache Struts Project Management Committee’s post (PMC) goes on to say that the assumption that the Equifax breach may have […] View the full article
  10. iOS11 May Complicate Border Searches (Lawfare): Apple’s focus on protecting customer data may have some serious implications for U.S. agents at the borders, a recent article says. The post on Lawfare explains how the new software udpate, iOS11, has additional security updates that make accessing the contents of a phone or tablet more difficult. The post notes that […] View the full article
  11. The University of Maryland Francis King Carey School of Law will be hosting a symposium this Friday, September 15, 2017. The event description is posted below and you can register here. “Brief description: The U.S. Department of Justice, Computer Crime and Intellectual Property Section, and the University of Maryland Francis King Carey School of Law invite […] View the full article
  12. Equifax: Where Percepton = Reality, Timing is Everything This is a follow up to a previous post. Paul Monica’s recent article in CNN:Money indicates that Officers in the Equifax Corporation sold stock shares in the days following Equifax’s data breach. The article indicates that Equifax became aware of the breach on Saturday, July 29th and […] View the full article
  13. Equifax Data Breach Impacts 143M Americans Lee Mathews reports in a Forbes article that Equifax discovered a breach on July 29th that could impact nearly half of the US population. The article goes on to say that personally identifiable information (“PII”) such as social security numbers, birthdates, names, addresses, and credit card numbers comprise approximately […] View the full article
  14. How Cybersecurity Became 2017’s Hot New Major (The Village Voice): The byline reads, “Everybody wants to teach, but nobody can decide what it is.” An article last month discussed the gap between what cyber students are learning in school and the skills that employers in the work force are looking for. Despite how much […] View the full article
  15. Cyber Insurance: The devil is in the details In P.F. Chang’s China Bistro, Inc. v. Fed. Ins. Co., (U.S. Dist. Ct. LEXIS 70749, 2016) the U.S. District Court for the District of Arizona ruled in favor of the Federal Insurance Company in holding that the cyber insurance policy did not cover fees or penalties levied […] View the full article
  16. Taking Stock of Trump’s Cybersecurity Executive Order So Far (Wired): What has happened since President Trump finally signed his Cyber Executive Order on May 11? According to a recent article, many deadlines set by the Order have already been missed and several more are looming. Most of these deadlines are simply information gathering tools, however, and […] View the full article
  17. The NYU Tandon School of Engineering is hosting its 2017 Cyber Security Awareness Week. One part of this week is a Law and Policy competition. The deadline for entry to the competition is September 15, 2017. “The Law & Policy Competition challenges contestants to think about the big picture of cyber security law, policy, economics, and […] View the full article
  18. A recent article in LegalTech news highlights the difficulty in applying the “plain-view” doctrine within the digital realm. The article discusses web service provider Dream Host’s issues within the scope of search warrants related to data. While the D.C. Circuit Court ruled that DreamHost had to comply with the search warrant, the arguments that DreamHost […] View the full article
  19. Sharing Medical Data Is Noble, but Not Without Patients’ Consent (WSJ): A law passed late year was considered the biggest healthcare reform law since Obamacare. Most of it was positive, a recent article says, but patient privacy rights took a big hit when the 21st Century Cures Act went into effect. The law does not […] View the full article
  20. Trump Cybersecurity Advisors Resign, Citing His ‘Insufficient Attention’ to Threats (Fortune): Seven of President Trump’s advisors from the National Infrastructure Advisory Council have resigned. The members accounted for nearly a quarter of the Council and many were Obama appointees, an article said. In their resignation letter, which is included below, the seven cited to […] View the full article
  21. The President’s National Infrastructure Advisory Council (NIAC), composed of senior executives from industry and State and local government who own and operate the critical infrastructure, issued an August 2017 report entitled, “Securing Cyber Assets: Addressing Urgent Cyber Threats to Critical Infrastructure.” Noting that “[c]yber is the sole arena where private companies are the front line […] View the full article
  22. North Korean Cyber Capabilities is the topic of a report from the Congressional Research Service, which notes: The North Korean government has devoted significant resources to develop its cyber operations and has grown increasingly sophisticated in its ability to attack targets. Among governments that pose cyber threats to the United States, some analysts consider the […] View the full article
  23. The Justice Department’s Role in Cyber Incident Response is the topic of a new report from the Congressional Research Service. “The Department of Justice (DOJ), through the Federal Bureau of Investigation (FBI, or the bureau) and National Cyber Investigative Joint Task Force (NCIJTF), is the designated lead on threat response, which involves investigating and attributing […] View the full article
  24. The looming nuclear threats from North Korea have temporarily subsided but the nation’s cyber operations, labeled HIDDEN COBRA, have continued. The United States Computer Emergency Readiness Team (US-CERT) issued an updated version of a joint statement and technical report on behalf of the Department of Homeland Security and the Federal Bureau of Investigation. The […] View the full article
  25. Symantec’s Internet Security Threat Report: Volume 22 Some of the highlights from the Symantec Report include: The use of zero-day exploits and sophisticated malware is decreasing as malevolent actors are now focusing on traditional spear-phishing attacks and leveraging existing tools (e.g. built-in OS commands/utilities) Nation-States and targeted disruptive attacks: Symantec points to the DNC hack […] View the full article
  26. From the Office of the U.S. Trade Representative: USTR Announces Initiation of Section 301 Investigation of China Washington, DC – Today, U.S Trade Representative Robert Lighthizer formally initiated an investigation of China under Section 301 of the Trade Act of 1974. The investigation will seek to determine whether acts, policies, and practices of the Government […] View the full article
  27. Still dual-hatted, or not? We’ve been reporting on this issue for years, but it is hard to tell from this statement. The White House Office of the Press Secretary For Immediate Release August 18, 2017 Statement by President Donald J. Trump on the Elevation of Cyber Command I have directed that United States Cyber Command […] View the full article
  1. Load more activity
×