Search Results for: technology Blog Post Small Banks are a Step Behind Ransomware Groups, Seek Help from Congress December 1, 2021 Ransomware attacks on smaller, community banks in the US have ramped up in recent years, putting the financial data of... Blog Post Hackers Steal $140 Million From Users of Crypto Gaming Company January 28, 2022 Today, it seems like successful multi-million dollar hacks have become an everyday occurrence. What’s more, it feels like it has... Blog Post New Cybersecurity Threats for the Crypto Industry August 13, 2021 Blockchain-based cryptocurrencies and financial systems are supposed to be inherently more secure than traditional fiat currencies, thanks to their decentralized... Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology... Blog Post Blockchain Technology: What You Need to Know April 29, 2020 The blockchain originated from Bitcoin. As the underlying technology of Bitcoin, it is essentially a decentralized database. It refers to... Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set.... Blog Post Facial Recognition Technology Causes Fear to 79% of Chinese Citizens December 25, 2019 In a survey of 6,100 Chinese citizens reported this month, 79% of the citizens had responded that they were worried... Blog Post Army is advancing facial recognition technology September 2, 2019 “The Army employs biometrics systems in operations to support force protection, physical access needs, other operations but largely it’s been... Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well... Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... Blog Post State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish... Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions.... Blog Post Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation... Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Blog Post Small Banks are a Step Behind Ransomware Groups, Seek Help from Congress December 1, 2021 Ransomware attacks on smaller, community banks in the US have ramped up in recent years, putting the financial data of...
Blog Post Hackers Steal $140 Million From Users of Crypto Gaming Company January 28, 2022 Today, it seems like successful multi-million dollar hacks have become an everyday occurrence. What’s more, it feels like it has...
Blog Post New Cybersecurity Threats for the Crypto Industry August 13, 2021 Blockchain-based cryptocurrencies and financial systems are supposed to be inherently more secure than traditional fiat currencies, thanks to their decentralized...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology...
Blog Post Blockchain Technology: What You Need to Know April 29, 2020 The blockchain originated from Bitcoin. As the underlying technology of Bitcoin, it is essentially a decentralized database. It refers to...
Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set....
Blog Post Facial Recognition Technology Causes Fear to 79% of Chinese Citizens December 25, 2019 In a survey of 6,100 Chinese citizens reported this month, 79% of the citizens had responded that they were worried...
Blog Post Army is advancing facial recognition technology September 2, 2019 “The Army employs biometrics systems in operations to support force protection, physical access needs, other operations but largely it’s been...
Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well...
Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically...
Blog Post State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish...
Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions....
Blog Post Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation...
Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...