{"id":1778266,"date":"2018-07-22T09:03:18","date_gmt":"2018-07-22T13:03:18","guid":{"rendered":"https:\/\/securityboulevard.com?page_id=1778266&#038;preview_id=1778266"},"modified":"2018-07-22T11:01:05","modified_gmt":"2018-07-22T15:01:05","slug":"cyberlaw","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/cyberlaw\/","title":{"rendered":"Cyberlaw"},"content":{"rendered":"<div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"b4f20b4ps9\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037237\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw.png\" class=\"pt-cv-thumbnail img-none\" alt=\"A D-Link DSR-250N, which is now EOL\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">1 week ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2036079\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/insurance-firm-introduces-liability-coverage-for-cisos\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Micron-Intellectual-Property-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"SolarWinds Uber CISO liability protection\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/insurance-firm-introduces-liability-coverage-for-cisos\/\" class=\"_self cvplbd\" target=\"_self\" >Insurance Firm Introduces Liability Coverage for CISOs<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-12T08:50:59-05:00\">3 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2035670\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-operation-shuts-down-22000-malicious-servers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"Interpol Operation Synergia ransomware phishing\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-300x117.jpg 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1024x399.jpg 1024w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-768x299.jpg 768w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1536x598.jpg 1536w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0.jpg 1540w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-operation-shuts-down-22000-malicious-servers\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol Operation Shuts Down 22,000 Malicious Servers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-06T11:31:24-05:00\">4 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#b4f20b4ps9\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#b4f20b4ps9\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-80ef02beiz\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t\n<div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037237\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"A D-Link DSR-250N, which is now EOL\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/d-link\/' title='D-Link' class='pt-cv-tax-d-link'>D-Link<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-corporation\/' title='D-Link Corporation' class='pt-cv-tax-d-link-corporation'>D-Link Corporation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-vulnerability\/' title='D-Link vulnerability' class='pt-cv-tax-d-link-vulnerability'>D-Link vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-zero-day\/' title='D-Link zero day' class='pt-cv-tax-d-link-zero-day'>D-Link zero day<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things\/' title='Internet of things' class='pt-cv-tax-internet-of-things'>Internet of things<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot\/' title='Internet of Things (IoT)' class='pt-cv-tax-internet-of-things-iot'>Internet of Things (IoT)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-cyber-security\/' title='Internet of Things cyber security' class='pt-cv-tax-internet-of-things-cyber-security'>Internet of Things cyber security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037232\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/ai-in-cybercrime-hackers-exploiting-openai\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"AI in Cybercrime: Hackers Exploiting OpenAI\" title=\"\" data-cvpsrc=\"https:\/\/www.cimcor.com\/hubfs\/AI%20in%20Cybercrime%20Hackers%20Exploiting%20OpenAI.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/ai-in-cybercrime-hackers-exploiting-openai\/\" class=\"_self cvplbd\" target=\"_self\" >AI in Cybercrime: Hackers Exploiting OpenAI<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/lauren-yacono\/\" rel=\"author\">Lauren Yacono<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T10:15:00-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cybercrime\/' title='cybercrime' class='pt-cv-tax-cybercrime'>cybercrime<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/podcast\/' title='Podcast' class='pt-cv-tax-podcast'>Podcast<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">In a recent podcast interview with Cybercrime Magazine's host, Charlie Osborne, Heather Engel, Managing Partner at Strategic Cyber Partners, discusses reports from OpenAI that hackers are trying to use its tools for ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Cimcor Blog&feed_id=502&blog_url=https:\/\/www.cimcor.com\/blog\">Cimcor Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036079\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/insurance-firm-introduces-liability-coverage-for-cisos\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"SolarWinds Uber CISO liability protection\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Micron-Intellectual-Property-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/insurance-firm-introduces-liability-coverage-for-cisos\/\" class=\"_self cvplbd\" target=\"_self\" >Insurance Firm Introduces Liability Coverage for CISOs<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-12T08:50:59-05:00\">November 12, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso-job\/' title='CISO job' class='pt-cv-tax-ciso-job'>CISO job<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-liability-insurance\/' title='cyber liability insurance' class='pt-cv-tax-cyber-liability-insurance'>cyber liability insurance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/solarwinds\/' title='SolarWinds' class='pt-cv-tax-solarwinds'>SolarWinds<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/uber\/' title='Uber' class='pt-cv-tax-uber'>Uber<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing regulatory pressures and sophisticate cyberattacks but often are not covered by their organizations' D&O ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035670\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-operation-shuts-down-22000-malicious-servers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Interpol Operation Synergia ransomware phishing\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-operation-shuts-down-22000-malicious-servers\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol Operation Shuts Down 22,000 Malicious Servers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-06T11:31:24-05:00\">November 6, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/interpol\/' title='Interpol' class='pt-cv-tax-interpol'>Interpol<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/law-enforcement-agencies\/' title='Law enforcement agencies' class='pt-cv-tax-law-enforcement-agencies'>Law enforcement agencies<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Interpol, other law enforcement agencies, and cybersecurity firms teamed up for Operation Synergia II, shutting down 22,000 malicious servers that supported ransomware, phishing, and other attacks and arresting 41 people connected to ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034878\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Canadian \u201cmounties\u201d marching down the street\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >\u00d4! China Hacks Canada too, Says CCCS<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-01T12:44:35-04:00\">November 1, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/canada\/' title='canada' class='pt-cv-tax-canada'>canada<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/canadian-centre-for-cyber-security\/' title='Canadian Centre for Cyber Security' class='pt-cv-tax-canadian-centre-for-cyber-security'>Canadian Centre for Cyber Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/canadian-government\/' title='Canadian Government' class='pt-cv-tax-canadian-government'>Canadian Government<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china\/' title='china' class='pt-cv-tax-china'>china<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-linked-hackers\/' title='China-linked Hackers' class='pt-cv-tax-china-linked-hackers'>China-linked Hackers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-nexus-cyber-attacks\/' title='China-nexus cyber attacks' class='pt-cv-tax-china-nexus-cyber-attacks'>China-nexus cyber attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-nexus-cyber-espionage\/' title='China-nexus cyber espionage' class='pt-cv-tax-china-nexus-cyber-espionage'>China-nexus cyber espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese\/' title='Chinese' class='pt-cv-tax-chinese'>Chinese<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-communists\/' title='Chinese Communists' class='pt-cv-tax-chinese-communists'>Chinese Communists<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-cyber-espionage\/' title='Chinese cyber espionage' class='pt-cv-tax-chinese-cyber-espionage'>Chinese cyber espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-government\/' title='chinese government' class='pt-cv-tax-chinese-government'>chinese government<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hacker\/' title='chinese hacker' class='pt-cv-tax-chinese-hacker'>chinese hacker<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hackers\/' title='Chinese hackers' class='pt-cv-tax-chinese-hackers'>Chinese hackers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hacking-groups\/' title='Chinese Hacking Groups' class='pt-cv-tax-chinese-hacking-groups'>Chinese Hacking Groups<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-intelligence\/' title='Chinese Intelligence' class='pt-cv-tax-chinese-intelligence'>Chinese Intelligence<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-state-sponsored-cyberattacks\/' title='Chinese state-sponsored cyberattacks' class='pt-cv-tax-chinese-state-sponsored-cyberattacks'>Chinese state-sponsored cyberattacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/national-cyber-threat-assessment\/' title='National Cyber Threat Assessment' class='pt-cv-tax-national-cyber-threat-assessment'>National Cyber Threat Assessment<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/peoples-republic-of-china\/' title='Peoples Republic of China' class='pt-cv-tax-peoples-republic-of-china'>Peoples Republic of China<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Plus brillants exploits: Canadian Centre for Cyber Security fingers Chinese state sponsored hackers ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034793\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/the-6-most-common-network-vulnerabilities-haunting-csos-in-2024\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"The 6 Most Common Network Vulnerabilities Haunting CSOs in 2024\" title=\"\" data-cvpsrc=\"https:\/\/www.cimcor.com\/hubfs\/Haunting%20CSOs.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/the-6-most-common-network-vulnerabilities-haunting-csos-in-2024\/\" class=\"_self cvplbd\" target=\"_self\" >The 6 Most Common Network Vulnerabilities Haunting CSOs in 2024<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/lauren-yacono\/\" rel=\"author\">Lauren Yacono<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-31T10:15:00-04:00\">October 31, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cybercrime\/' title='cybercrime' class='pt-cv-tax-cybercrime'>cybercrime<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Network security is significantly more challenging than it was several years ago. Today's IT teams struggle against a cybersecurity talent shortage, an increasing number of endpoints in their network, and the ever-changing ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Cimcor Blog&feed_id=502&blog_url=https:\/\/www.cimcor.com\/blog\">Cimcor Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034486\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/jpmorgan-chase-bank-glitch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"An unfortunate TikToker shows off his negative balance\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/jpmorgan-chase-glitch-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/jpmorgan-chase-bank-glitch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >TikTok \u2018Infinite Money Glitch\u2019 \u2014 Idiots Chased by JPMorgan<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-29T12:11:23-04:00\">October 29, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/chase-bank\/' title='Chase Bank' class='pt-cv-tax-chase-bank'>Chase Bank<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/disinformation\/' title='disinformation' class='pt-cv-tax-disinformation'>disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/how-to-be-safe-on-social-media\/' title='how to be safe on social media' class='pt-cv-tax-how-to-be-safe-on-social-media'>how to be safe on social media<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/j-p-morgan-chase\/' title='J.P. Morgan Chase' class='pt-cv-tax-j-p-morgan-chase'>J.P. Morgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/jp-morgan-chase\/' title='JP Morgan Chase' class='pt-cv-tax-jp-morgan-chase'>JP Morgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/jpmorgan-chase\/' title='JPMorgan Chase' class='pt-cv-tax-jpmorgan-chase'>JPMorgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/misinformation\/' title='Misinformation' class='pt-cv-tax-misinformation'>Misinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-disinformation\/' title='online disinformation' class='pt-cv-tax-online-disinformation'>online disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/social-disinformation\/' title='Social disinformation' class='pt-cv-tax-social-disinformation'>Social disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/social-media\/' title='social media' class='pt-cv-tax-social-media'>social media<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/socialmedia\/' title='socialmedia' class='pt-cv-tax-socialmedia'>socialmedia<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-glitches\/' title='software glitches' class='pt-cv-tax-software-glitches'>software glitches<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/tiktok\/' title='TikTok' class='pt-cv-tax-tiktok'>TikTok<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/x\/' title='X' class='pt-cv-tax-x'>X<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Dimon\u2019s dollars (not yours): No, Chase Bank isn\u2019t going to let you cash bad checks. It\u2019s fraud\u2014no matter what X and TikTok tell you ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034275\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/unitedhealth-change-healthcare-100m-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"An adorable kitten\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/kitten-richixbw-freddie-marriage-iYQC9xWMvw4-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/unitedhealth-change-healthcare-100m-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >100 MILLION Americans in UnitedHealth PII Breach<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-25T11:26:42-04:00\">October 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/2fa\/' title='2fa' class='pt-cv-tax-2fa'>2fa<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/2fa-policies\/' title='2FA policies' class='pt-cv-tax-2fa-policies'>2FA policies<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/2fa-mfa\/' title='2FA\/MFA' class='pt-cv-tax-2fa-mfa'>2FA\/MFA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/alphv\/' title='ALPHV' class='pt-cv-tax-alphv'>ALPHV<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/alphv-ransomware\/' title='ALPHV ransomware' class='pt-cv-tax-alphv-ransomware'>ALPHV ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/blackcat\/' title='Blackcat' class='pt-cv-tax-blackcat'>Blackcat<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/blackcat-ransomware\/' title='BlackCat ransomware' class='pt-cv-tax-blackcat-ransomware'>BlackCat ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/blackcat-alphv-ransomware\/' title='BlackCat\/ALPHV ransomware' class='pt-cv-tax-blackcat-alphv-ransomware'>BlackCat\/ALPHV ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/change-healthcare\/' title='Change Healthcare' class='pt-cv-tax-change-healthcare'>Change Healthcare<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hipaa\/' title='HIPAA' class='pt-cv-tax-hipaa'>HIPAA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hipaa-laws\/' title='hipaa laws' class='pt-cv-tax-hipaa-laws'>hipaa laws<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hipaa-rule\/' title='hipaa rule' class='pt-cv-tax-hipaa-rule'>hipaa rule<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/mfa\/' title='MFA' class='pt-cv-tax-mfa'>MFA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/multi-factor-authenication\/' title='multi-factor authenication' class='pt-cv-tax-multi-factor-authenication'>multi-factor authenication<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/multi-factor-authentication\/' title='Multi-Factor Authentication' class='pt-cv-tax-multi-factor-authentication'>Multi-Factor Authentication<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/multi-factor-authentication-mfa\/' title='Multi-Factor Authentication (MFA)' class='pt-cv-tax-multi-factor-authentication-mfa'>Multi-Factor Authentication (MFA)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/multi-factor-auth\/' title='multi-factor-auth' class='pt-cv-tax-multi-factor-auth'>multi-factor-auth<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/multifactor-authentication\/' title='Multifactor Authentication' class='pt-cv-tax-multifactor-authentication'>Multifactor Authentication<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/multifactorauthentication\/' title='multifactorauthentication' class='pt-cv-tax-multifactorauthentication'>multifactorauthentication<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/steven-martin\/' title='Steven Martin' class='pt-cv-tax-steven-martin'>Steven Martin<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/two-factor-authentication-2fa\/' title='two-factor-authentication.2fa' class='pt-cv-tax-two-factor-authentication-2fa'>two-factor-authentication.2fa<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/uhg\/' title='UHG' class='pt-cv-tax-uhg'>UHG<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/unitedhealth\/' title='UnitedHealth' class='pt-cv-tax-unitedhealth'>UnitedHealth<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Not cute: $UNH\u2019s Change Healthcare unit paid a big ransom\u2014its IT was as weak as a kitten ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034177\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/white-house-memo-puts-the-focus-of-ai-on-national-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"White House AI national security\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/11\/us-flag-lucas-sankey-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/white-house-memo-puts-the-focus-of-ai-on-national-security\/\" class=\"_self cvplbd\" target=\"_self\" >White House Memo Puts the Focus of AI on National Security<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-24T15:24:40-04:00\">October 24, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ai\/' title='AI' class='pt-cv-tax-ai'>AI<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/biden-administration\/' title='Biden administration' class='pt-cv-tax-biden-administration'>Biden administration<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/national-security\/' title='national security' class='pt-cv-tax-national-security'>national security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">A national security memo released by the Biden Administration is order government agencies to ensure the development and use of AI enables the United States to keep its edge in AI over ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034212\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/disney-leak-reveals-financial-and-strategy-secrets\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Disney Leak Reveals Financial and Strategy Secrets\" title=\"\" data-cvpsrc=\"https:\/\/www.cimcor.com\/hubfs\/Disney%20Leak%20Reveals%20Financial%20and%20Strategy%20Secrets.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/disney-leak-reveals-financial-and-strategy-secrets\/\" class=\"_self cvplbd\" target=\"_self\" >Disney Leak Reveals Financial and Strategy Secrets<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/lauren-yacono\/\" rel=\"author\">Lauren Yacono<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-24T10:15:00-04:00\">October 24, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cybercrime\/' title='cybercrime' class='pt-cv-tax-cybercrime'>cybercrime<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/podcast\/' title='Podcast' class='pt-cv-tax-podcast'>Podcast<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">In a recent podcast interview with Cybercrime Magazine's host, David Braue, Scott Schober, Cyber Expert, Author of \"Hacked Again,\" and CEO of Berkeley Varitronics Systems, discusses a recent data breach affecting information ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Cimcor Blog&feed_id=502&blog_url=https:\/\/www.cimcor.com\/blog\">Cimcor Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778266\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"9ecae9a538f359be835b9082997ddbff\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,R0lGODlhDwAPALMPAMrKygwMDJOTkz09PZWVla+vr3p6euTk5M7OzuXl5TMzMwAAAJmZmWZmZszMzP\/\/\/yH\/C05FVFNDQVBFMi4wAwEAAAAh+QQFCgAPACwAAAAADwAPAAAEQvDJaZaZOIcV8iQK8VRX4iTYoAwZ4iCYoAjZ4RxejhVNoT+mRGP4cyF4Pp0N98sBGIBMEMOotl6YZ3S61Bmbkm4mAgAh+QQFCgAPACwAAAAADQANAAAENPDJSRSZeA418itN8QiK8BiLITVsFiyBBIoYqnoewAD4xPw9iY4XLGYSjkQR4UAUD45DLwIAIfkEBQoADwAsAAAAAA8ACQAABC\/wyVlamTi3nSdgwFNdhEJgTJoNyoB9ISYoQmdjiZPcj7EYCAeCF1gEDo4Dz2eIAAAh+QQFCgAPACwCAAAADQANAAAEM\/DJBxiYeLKdX3IJZT1FU0iIg2RNKx3OkZVnZ98ToRD4MyiDnkAh6BkNC0MvsAj0kMpHBAAh+QQFCgAPACwGAAAACQAPAAAEMDC59KpFDll73HkAA2wVY5KgiK5b0RRoI6MuzG6EQqCDMlSGheEhUAgqgUUAFRySIgAh+QQFCgAPACwCAAIADQANAAAEM\/DJKZNLND\/kkKaHc3xk+QAMYDKsiaqmZCxGVjSFFCxB1vwy2oOgIDxuucxAMTAJFAJNBAAh+QQFCgAPACwAAAYADwAJAAAEMNAs86q1yaWwwv2Ig0jUZx3OYa4XoRAfwADXoAwfo1+CIjyFRuEho60aSNYlOPxEAAAh+QQFCgAPACwAAAIADQANAAAENPA9s4y8+IUVcqaWJ4qEQozSoAzoIyhCK2NFU2SJk0hNnyEOhKR2AzAAj4Pj4GE4W0bkJQIAOw==\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-4653f00qln\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1778266","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberlaw - Security Boulevard<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/cyberlaw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberlaw\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/cyberlaw\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-22T15:01:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/cyberlaw\/\",\"url\":\"https:\/\/securityboulevard.com\/cyberlaw\/\",\"name\":\"Cyberlaw - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2018-07-22T13:03:18+00:00\",\"dateModified\":\"2018-07-22T15:01:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/cyberlaw\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/cyberlaw\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/cyberlaw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberlaw\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyberlaw - Security Boulevard","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/cyberlaw\/","og_locale":"en_US","og_type":"article","og_title":"Cyberlaw","og_url":"https:\/\/securityboulevard.com\/cyberlaw\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-07-22T15:01:05+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/cyberlaw\/","url":"https:\/\/securityboulevard.com\/cyberlaw\/","name":"Cyberlaw - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2018-07-22T13:03:18+00:00","dateModified":"2018-07-22T15:01:05+00:00","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/cyberlaw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/cyberlaw\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/cyberlaw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Cyberlaw"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-7sBI","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1778266"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778266\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1778266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}