This story has far-reaching implications that could affect every walk of life: the personal information of millions of schoolchildren has been put at risk after the successful hacking of PowerSchool, the developer of a widely used education tech program. The company’s Student Information System (SIS) is a digital platform that…
The newly establish Department of Government Efficiency (DOGE) has created quite the stir in Washington, causing legal experts to speculate that the organization has violated the Privacy Act as well as various cybersecurity laws. By taking control of the Treasury Department’s central payments database, they argue, DOGE has created an…
Although this story occurs outside of the United States and United Kingdom, it details governmental cybersecurity actions that should concern citizens everywhere. The Turkish government is proposing a law to empower their recently conceived Cybersecurity Directorate. Prior to this proposal, Turkey mirrored the United States by lacking comprehensive federal cybersecurity…
Poised to radically disrupt the generative AI space, the Chinese startup, DeekSeek, sent shockwaves across global economic markets after debuting its R1 AI assistant in January. As a reasoning model, DeepSeek is fed a myriad of data by its parent company, High-Flyer, so that it can train itself to better…
It appears the notorious ransomware group, LockBit, is back on the scene after making headlines as the most ubiquitous form of ransomware in 2022. With double extortion tactics and an ability to work around traditional security measures, this Ransomware-as-a-Service (RaaS) model is deceptive, effective and able to distribute malware at…
With every new presidential administration comes a new approach to federal policy—and this includes new approaches to cybersecurity protections. In the wake of the January inauguration, the question on many cybersecurity experts’ minds is: what should we expect from the Trump administration? Will previous strategies continue to be employed, or…
The recent enforcement of the TikTok ban (prior to its temporary reversal by President Trump) has left many wondering about the risks posed by the popular social media app. Sure, TikTok is owned by a Chinese company, but how dangerous is this really to national security and our data privacy?…
As we reach the end of the Holiday season, individuals are more likely to be reactive as opposed to proactive in how they treat their online activity. That’s why we reached out to Phil Reitinger to discuss a few crucial steps to keep your cybersecurity at the forefront of your…
We know, we know: infrastructure is not the sexiest topic when it comes to cybersecurity. However, powerful cybersecurity is not only impossible without strong infrastructure—infrastructure is also one of the most important assets for cybersecurity to protect! The unspoken bulwark against bad actors is our federal cybersecurity infrastructure; however, some…
In previous issues, we have discussed the relative paucity of cybersecurity laws in the United States. Despite the relative lack of legislation in the United States, 2024 saw tremendous changes to cybersecurity rules across the globe. Here are some of those changes: The E.U.’s NIS2 – With a 21-month implementation…
Although most cybersecurity attacks have been levied against laptops and home networks, the rise of the use of smartphones has forced bad actors to get more creative. One recent case of a smartphone malware campaign targets Android users specifically. By stealing contactless credit card payment data, hackers can leverage this…
For nearly 30 years, the Health Insurance Portability and Accountability Act (HIPPA) has protected sensitive health information from being disseminated to third parties without the consent of the patient. The right to one’s own medical information is critical, especially in a day and age in which personal information is being…
The launch of the Federal Communications Commission’s (FCC) privacy and data protection task force in June of 2023 has led to several major privacy actions. It has also resulted in multiple partnerships between the agency and 10 different state attorneys general. The decision of the FCC to take an active…
It has been a few issues since we have discussed a widespread trend in customer behavior that has impacted how companies do business; the importance of safeguarding consumers’ privacy. In the age of AI, it is more important than ever for companies to take proactive and intentional steps to protect…