Archives
Author Archive
for: ‘’

Cyberattacks and the costs of reputational harm

A few months ago, I wrote about cyber insurance and its place in an organization’s cybersecurity plans (“Managing cyber risk: Is cyber liability insurance important for law firms?”, June B&B). In my estimation, the most valuable aspect of cyber insurance lies in applying for it. Making organizations go through the paces to evaluate their cybersecurity postures, […]

Read More

Fair elections and cybersecurity

With the November congressional elections right around the corner, many observers are revisiting a primary theme of the 2016 presidential election—security, hacking, and Russian involvement. It is certainly a contentious topic, but no matter where you fall on the political spectrum, it remains the case that elections are just as vulnerable to cyberattacks as private […]

Read More

E-discovery vs. forensics: Analyzing digital evidence

Digital evidence continues to be a growing focus of the legal community. In a very real way, digital evidence and its utilization in court can be compared to the advances in the use of DNA science that our courts saw in the last century. In a ubiquitously digital world, digital evidence has applications in almost […]

Read More

Managing Cyber Risk: Is cyber liability insurance important for law firms?

Cyber liability insurance policies are growing in popularity among organizations that store client data, but in my experience those who have them are probably just as confused about what they cover as those who decide to go without. Generally described, cyber liability insurance is meant to protect businesses and organizations from cybersecurity risks posed by […]

Read More

Social engineering: How cybercriminals capitalize on urgency

Making a request seem urgent clouds the fact that the request violates protocol or the norm.  I was recently approached by a concerned person who wanted me to scrutinize an email received a few days prior. “Does this look like a phishing email? I don’t see any grammatical errors. But it’s asking me to visit this […]

Read More

Stephen Allwine: When crime tries to cover its digital tracks

In late 2016, I was approached by the Washington County (MN) Attorney’s Office to conduct forensic analysis on a number of devices in a homicide investigation. It soon became clear that the case would be one of the most interesting of my career, involving murder-for-hire, religious convictions, insurance money, infidelity, and a distinctly modern element—the […]

Read More

Is the Internet of Things spying on you?

So is your phone spying on you? Yes, it’s possible. A few months ago, Computer Forensic Services analyst Sean Lanterman spoke to KARE 11 News about a topic that makes a lot of people nervous. “Is my phone spying on me?” may have seemed like a paranoid question at one point, but it now seems like […]

Read More

#UberFail

The recent headlines about Uber’s 2016 data breach describe yet another cyber event that left millions compromised and rightfully angry. But yet again, people by and large are not angry that the breach happened, or even necessarily about the large size of the breach, which involved approximately 57 million Uber riders and drivers. Mostly, people […]

Read More

Ransomware: To pay or not to pay?

“No matter what you do, you might become a victim. Yet there are very manageable and reasonable ways to prepare yourself for the possibility that it will happen to you or your organization.” I got a great question from a concerned audience member at a recent speaking event: “If I am a victim of ransomware, should I pay […]

Read More

How digital evidence supported gerrymandering claims

Earlier this month, I had the once-in-a-lifetime opportunity to travel to the United States Supreme Court to witness the headline-making gerrymandering oral arguments out of Wisconsin. Some people are calling this case the most important of the year, with enormous potential consequences for political redistricting and any number of similar cases in which gerrymandering claims […]

Read More
Page 1 of 212»

Articles by Issue

Articles by Subject