GET UP TO SPEED ON ALL THINGS CYBER

We facilitate the exchange of crowdsourced cyber insights, experiences and differing opinions that challenge the status quo.

Our mission is to elevate cybersecurity awareness and defense through the content we generate. All of our original content is steered by our Content Advisory Committee, comprised of cyber leaders that you recognize and trust.

Our audience is diverse, ranging from CXO and board members, to members of the public with an interest in IT security such as students and business owners. Discussions address topics in business and personal security. Content published on Cyber Business Review is always ungated and freely available.

LATEST CYBER NEWS

02/02/2024 U.S. government sanctions Iranian officials over Pennsylvania water facility hack

The Iranian attack targeted a device manufactured by an Israeli company. (read more)

- - - - - - - - - - - - - - - - - - - - - -

01/29/2024 Wow! Mother of all breaches reveals 26 billion records: what we know so far

The supermassive leak contains data from numerous previous breaches, comprising an astounding 12 terabytes of information, spanning over a mind-boggling 26 billion records.  (read more)

- - - - - - - - - - - - - - - - - - - - - -

01/22/2024 Smartphone ambient light sensors allow spying

Android and iPhone ambient light sensors can be turned into cameras, allowing malicious actors to secretly film unsuspecting victims and their surroundings. (read more)

From Personal Information to Trade Secrets: Welcome to the Accelerated Digital Age!

From Personal Information to Trade Secrets: Welcome to the Accelerated Digital Age!

17-May | Written by Vanessa Henri , Marek Nitoslawski and Eliane Ellbogen.

The authors will delve into the issue of protecting trade secrets, which is more topical than ever with the current prevalence of the “work-from-home” model. Specifically, the authors look at how the legal framework and considerations tied to the protection of trade secrets differ from those of personal information, but also, how in certain contexts, these two types of informational assets can overlap. For example, when personal information is used to fuel predictive algorithms, it may also be protectable as a trade secret. The governance and protection of all valuable information assets including, especially now, trade secrets, should be at the forefront of today’s business concerns.

Read More
Artificial Intelligence, Trust and the Cybersecurity Industry: What’s Cooking?

Artificial Intelligence, Trust and the Cybersecurity Industry: What’s Cooking?

22-July | Written by Vanessa Henri & Linda Agaby
AI is a double-edged sword. In the hands of cyber criminals, it can enable automated attacks with ever-increasing sophistication. In the hands of cyber defenders, it can help scale up defense against such attacks. Either way, AI is here to stay, and along with it comes pros, cons and changing legislations. Emerging Technology Lawyers Vanessa Henri and Linda Agaby from Fasken provide a strategic overview of AI from a cybersecurity angle, highlighting groundwork already laid by policy makers, and offering a glimpse to what’s on the horizon. – Steve Tso

Read More
Executives, Are you on the Hook for Cybersecurity Liability?

Executives, Are you on the Hook for Cybersecurity Liability?

12-May | Written by Vanessa Henri & Oleg Stratiev
COVID-19 has forced businesses to migrate online at an unprecedented pace. While this may preserve business continuity, the yet unknown costs associated with cybersecurity may be lurking. When they rear their unpleasant heads, who is liable? Vanessa Henri and Oleg Stratiev are both lawyers at Fasken, and they share their thoughts on this sensitive topic from a legal perspective in this CBR Featured Post. – Steve Tso

Read More

SUBSCRIBE TO OUR NEWSLETTER
to receive news and updates

By signing up, you agree to our Privacy Policy.