WindTalker Blog

Sensitive Facebook User Records Exposed on Web, But What About the Unstructured Stuff?

Posted by WindTalker, Inc.

In the Washington Post article, entitled “Millions of sensitive Facebook user records were left exposed on public web, security researchers say,” Post reporters Tony Romm and Elizabeth Dwoskin report that over a half billion Facebook records have been sitting exposed to any comers on an Amazon cloud-computing server. Cybersecurity implications – and lessons –keep spinning off from the social media giant’s privacy stumblings.

Read More

Topics: LegalTechnology, securityrisk, riskmanagement, datasecurity, sensativedata, risk, Unstructureddata, legal

Dark Overlord Hack Raises Stakes for Law Firms

Posted by WindTalker, Inc.

In his February 2019 article for Law Journal Newsletters, “’Dark Overlord’ Hack Shows Mounting Cyber Risks for Law Firms” law firm global strategy and economics writer Dan Packel reports on a law firm’s worst nightmare: potentially becoming the weak link in a global extortion plot related to the 9/11 World Trade Center attacks.

Read More

Topics: WindTalker, LegalTechnology, Manafort, LegalTech, cybersecurity, securityrisk, cyberattack, darklord, Mueller

Manafort Redaction Disaster Revisited: State-of-the-Art Infosecurity Software Would Have Prevented It (and could have fixed and tracked it)

Posted by WindTalker, Inc.

Jason Tashea’s 1/10/19 article in the ABA Journal online, “How to redact a PDF and protect your clients,” further affirms the dangers of legacy software, underestimating technology risk, and mindset; yet it fails to identify current Infosecurity software solutions.

Read More

Topics: WindTalker, Differentialsharing, Manafort, LegalTech, redaction, softwaresolutions, securityrisk, riskmanagement

The WindTalker Blog

A Perspective on Cybersecurity Developments

Join us as we explore newsworthy developments in Cybersecurity. The WindTalker Blog is dedicated to sharing and informing the latest developments and providing a resource for subscribers in your journey to become more informed and protect your sensitive information.


Covering:
• Differential Sharing
• Avoiding Data Breaches
• Information Security

Subscribe Here!

Recent Posts