McKinsey’s interviewed Don Tapscott who defined Blockchain as an “immutable, unhackable distributed database of digital assets” which is a “giant, global spreadsheet that runs on millions and millions of computers.”  The May 2016 article entitled “How blockchains could change the world” included these comments about Bitcoin:

Most blockchains—and

Continue Reading Blockchain is what makes Bitcoin work, and is the real deal to change the world!

Trend Micro’s conducted a study to learn more about “how stolen medical records are monetized after a breach, what types of data are stolen, how much they are sold for on the underground markets, and how cybercriminals make use of them” and use “Shodan scan data which reveals what healthcare-related

Continue Reading Electronic Health Record (EHR) databases worth $500,000 to cybercriminals!


Huge headlines about the Yahoo cyber indictment by the FSB should be a wake call to all businesses, however what has not been promoted by the media was the use of spearphishing which was highlighted in paragraph 17 of the Indictment:

In some instances, the conspirators used email messages

Continue Reading Spearphising by the Russian Federal Security Service (FSB) was part of Yahoo cyber attack!


My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and

Continue Reading GUEST BLOG: Just what no one wants to hear – new insecurities are found on private cloud devices!


The Federal Trade Commission (FTC) hosted its third FinTech Forum which was “designed to bring together industry participants, consumer groups, researchers, and government representatives, to examine the ways in which these technologies are being used to offer consumers services, the potential benefits, and consumer protection implications as these technologies continue

Continue Reading Consumer protection & privacy paramount at the FTC Forum on Artificial Intelligence (AI) and Blockchain


The New York Times reported that Uber’s Greyball “uses data collected from the Uber app and other techniques to identify and circumvent officials who were trying to clamp down on the ride-hailing service.”  The March 3, 2017 article entitled “How Uber Deceives the Authorities Worldwide” said that Uber

Continue Reading Is Uber’s Greyball a VTOS (Violation of Terms Of Service) or Deception?


Amazon is the largest cloud provider in the world, and so I doubt Amazon would ever admit a cyber intrusion caused any serious cloud outage. So February 28, 2017 following a serious cloud outage Amazon blamed on a typing error by a “Amazon Simple Storage Service (S3) team was debugging

Continue Reading Was there a Cyber intrusion on the Amazon Cloud, or did one keystroke cause the outage?


Bitdefender surveyed 250 US IT decision makers who concluded that  about “34 percent of companies were breached in the past 12 months, while 74 percent of IT decision makers don’t know how the company was breached” and “Two-thirds of companies would pay an average of $124k to avoid public shaming

Continue Reading 10 Recommendations to reduce cyber risk in the cloud, including being mindful of the law of where the data is hosted


I think it would be really great if you could figure out how to use Big Data and Artificial Intelligence to find life on the newly discovered “seven Earth-size planets that could potentially harbor life have been identified orbiting a tiny star not too far away, offering the first realistic

Continue Reading I CHALLENGE YOU to find life on 7 planets using Big Data and Artificial Intelligence that are 40 light years away!


The new law among other things “includes requirements that financial and insurance institutions retain a CISO, report cybersecurity incidents within 72 hours and use multifactor authentication.” On February 17, 2017 BankInfoSecurity.com reported a story entitled “Breach Preparedness , Compliance , Cybersecurity Reworked N.Y. Cybersecurity Regulation Takes Effect in March

Continue Reading Starting March 1st NY Cybersecurity Regulation requires Incident Response Plans (IRP)!