The US recently joined  Operation Hyperion to “share criminal intelligence and collaborate on operations to combat transnational crime” with the Five Eyes Law Enforcement Group (FELEG), an international coalition of law enforcement agencies from Australia, Canada, New Zealand, and the United Kingdom.  On November 1, 2016 the FBI issued its

Continue Reading The Cyber Underground and what you need to know about the DarkNet Marketplaces

The New York Times reported that the EU antitrust cases against Google are very broad and “relate to Android, Google’s mobile operating system, some of its dominant online search services and some of its advertising products.” The October 30, 2016 story entitled “The Stakes Are Rising in Google’s Antitrust

Continue Reading Are the EU antitrust cases against Google really just Russian roulette?


Ponemon Institute issued a report after it “surveyed 607 IT and IT security practitioners who are involved in the security of SAP” and that 58% “of respondents rate the difficulty of securing SAP applications as high and 65 percent of respondents rate their level of concern about malware infections in

Continue Reading BUSINESS ALERT: Cyberattacks are directed at ERP systems since they are difficult to secure


Thycotic took a survey of 250+ hackers at the August 2016 Black Hat conference and reported that “77% say no password is safe from hackers—or the government” which is hardly surprising. The “Black Hat 2016: Hacker Survey Report” included these comments about training:

Extend IT Security Awareness Training

Continue Reading BLACK HAT SURVEY: Employee Training is in the top 5 ways to avoid hacking!


Law360 reported that many experts are concerned that “companies who share cybersecurity incident information with a DOD contractor will be considered a third-party beneficiary of the DOD, with the ability to sue if confidential information is leaked or stolen, but that offers little solace to those who have their information

Continue Reading New Cyber rules for DOD contractors may be creating new problems!


Companies that transfer their accounting records between countries should know whether the new EU Privacy Shield applies to data whether it contains Personal Identifiable Information (PII) or PCI credit card information.  To learn more, please watch my recent video entitled “Data Transfer Agreements: What You Need to Know.

Continue Reading VIDEO: How does the EU Privacy Shield impact privacy for non-PII data or PCI?


Reuters reported that the Group of Seven (G7) industrial powers (Britain, Canada, France, Germany, Italy, Japan and the US) “agreed on guidelines for protecting the global financial sector from cyber attacks following a series of cross-border bank thefts by hackers.”  The October 11, 2016 report entitled “G7 sets common

Continue Reading Can the G7 really protect the financial world from cybercrime?


Please vote at the Expert Institute for this blog as the 2016 Best Legal Blog before voting ends on November 14, 2016 at 12 a.m. EST.

I am most thankful for all my friends around the world who comment about my Cyber and Privacy blogs since I started this Internet

Continue Reading Help make this Blog the top CYBER and PRIVACY Legal Blog!


The New York Times reported that a cybersecurity contractor for the NSA (National Security Agency) was arrested based on allegations that “he stole and disclosed highly classified computer code developed to hack into the networks of foreign governments.”  The October 6, 2016 article entitled “N.S.A. Contractor Arrested in Possible

Continue Reading “Top Secret” Electronic Records Stolen by NSA Cybersecurity Contractor!


My Guest Blogger Eric Levy is a senior attorney in Gardere’s Trial Practice Group who focuses on cyber security, PCI compliance, PII, eCommerce, and related complex litigation.

Apparently IoT is leading the FTC (Federal Trade Commission), the government watchdog of privacy, one step closer to broadening the scope of what

Continue Reading GUEST BLOG: Can the FTC control the privacy of the IoT (Internet of Things)?