Recent Posts
Sep 29, 2016
Version 6.1 of the Critical Security Controls Released
Thanks to Dave Ries for sending me the following information: Version 6.1 of the Center for Internet Security (CIS) Controls
Read MoreSep 28, 2016
A Looming Disaster: The Failure of Congress to Vote on the “Stop Mass Hacking Act”
The clock is ticking but nothing's happening. Well that's Congress. And it is election season. But Congress should be worried
Read MoreSep 27, 2016
Yahoo: The Largest Data Breach in History
More accurately, Yahoo is the largest publicly disclosed data breach in history. I've been waiting for the news to simmer
Read MoreSep 26, 2016
76% of Security Pros Believe Threat Intelligence Should be Shared
According to an SC Magazine post, more than three-quarters (76 percent) of security professionals believe they have a moral responsibility
Read MoreSep 22, 2016
What are the Top Colleges for Cybersecurity?
Information Week's Dark Reading provided a list of well-respected U.S. cybersecurity education programs at both undergraduate and graduate levels. Institutions
Read MoreSep 21, 2016
Cybersecurity Unemployment Rate is Zero
That's the conclusion of a Cybersecurity Ventures study which was reported by SC Magazine. The study shows that there will
Read MoreSep 20, 2016
Podcast: EFF’s Cindy Cohn on Hot Privacy Topics
Cindy Cohn is one of our favorite privacy law speakers and graciously agreed to talk to us on our most
Read MoreSep 19, 2016
Every Law Firm is a Technology Business
That is the title of an article by my good friend Jim Calloway, Director of the Oklahoma Bar Association Management
Read MoreSep 15, 2016
Delete Google Maps and Google Will Still Know Where You Are
A recent post in The Register reminds us how far away we are from the days when no one knew
Read MoreSep 14, 2016
Podcast: Cybersecurity for Solos and Small Law Firms
It was a great pleasure for John and I to welcome Oklahoma Bar Association's Management Assistance Program Director Jim Calloway
Read MoreSep 13, 2016
Sedona Conference Finalizes its Commentary for “Possession, Custody, or Control” of ESI
August was a busy month for the Sedona conference. I covered its draft primer for TAR cases recently and, with
Read MoreSep 12, 2016
Do You Have an Online Account That Was Compromised in a Data Breach?
There's an easy way to find out. If you enter your log-in ID on Troy Hunt's "Have I been pwned"
Read More