Cyber criminals’ entire business model is based on developing threats faster than the public can develop safeguards. Privacy laws are fast becoming the first place data collectors look for guidance when they have suffered a cyber attack. Unfortunately, the legislatures… Continue Reading →
Less than 24 hours after the Islamic State in Iraq and Syria (ISIS) killed more than 100 people in Paris, the hacking group Anonymous used an unverified video declaring war on ISIS. In a video posted to YouTube, an Anonymous… Continue Reading →
While large cyber attacks and data breaches may get the headlines, a recent study prepared by the Ponemon Institute and Hewlett-Packard and a recent criminal conviction of a Los Angeles Times reporter that disclosed corporate passwords on a hacker website serve… Continue Reading →
Cybersecurity concerns are no longer just for large retailers, state and local governments are the latest victims in these attacks. A new survey of government security professionals indicates their concern is warranted. MeriTalk, Inc., a company specializing in IT issues for governments, released… Continue Reading →
On March 23, 2015, Marsh and the United Kingdom Government released a Report titled: UK Cyber Security: The Role of Insurance in Managing and Mitigating the Risk. The Marsh Report is stated to be “the result of close working between the… Continue Reading →
Last week, the Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (“OCIE”) released its examination priorities for 2015. One area of focus will be assessing cybersecurity controls. TheOCIE’s letter to national exchanges sets out its examination approach for the… Continue Reading →
© 2025 Tressler LLP − Disclaimer | Privacy Policy
Tressler Blog Network Bad Faith BulletinCGL DispatchCondo Law WatchLocal Government LowdownThe Property LineSpecialty Lines Advisory