Call Now

215.222.3101
Hot Legal Issues. High-Tech Solutions.
215.222.3101
Contact Us Today

Blog Archives

Think You Can Get Away Without a Code Review? Think Again.

When discussing security options with our clients, we frequently hear them dismiss code review as an unnecessary extra. However, that perception couldn’t be further from the truth. Code review, a process in which software code is inspected for vulnerabilities before, during and after its implementation, is a necessary part of any cybersecurity strategy, especially if your company is about to implement a new program.   Although code writers are often brilliant scientists and artists, they may not be security specialists, …

The Future of Intrusion Detection

In 2013, networks had to contend with 80 million malware threats. In 2014, the number of new threats rose to 140 million. Furthermore, as recent attacks by hacker organizations Equation Group and Carbanak demonstrate, the new influx of malware is as undetectable as ever. Clearly, the proliferation of cyber threats shows no sign of abating, and strongholds of sensitive data must contend with them. Given the exponential growth of intelligent malware, this is a difficult task, but not impossible. The …

What The OPM Hack Means for Data Security and Privacy

Last month, reports flooded in that the Office of Personnel Management (OPM), a federal agency that (amongst other things) manages the data of millions of government workers, had been hacked sometime in May of this year. It was one of the largest reported government data breaches in history, though by no means the first for the federal government or even the OPM. More disturbing is the fact that the breach—suspected to be the work of hackers based in China—may have …

Cybersecurity and Related Legal Trends – A Successful CLE

Capsicum’s Leeza Garber, Esq. presented alongside Montgomery McCracken’s Michael Hayes and David Brown for a CLE on Cybersecurity and Related Legal Trends. The vibrant discussion centered on cyberattacks and why they are such a hot issue; how to guide your clients through a data breach; the landscape of existing federal and state laws you must consider in connection with cybersecurity and the potential impact of pending federal legislation on your cybersecurity and data breach notification responsibilities; recent federal cybersecurity enforcement …

Capsicum’s Leeza Garber, Esq. Presents for Temple Law Alumni Association

On June 8, Capsicum’s Leeza Garber, Esq. spoke for a large group of Temple Law Alumni for the Temple Law Alumni Association’s Annual Membership Meeting. Leeza spoke alongside Duncan Hollis (Associate Dean for Academic Affairs for Temple Law) and Jeffrey Vagle (Law School Professor at the University of Pennsylvania) regarding cybersecurity issues that law firms face for a CLE presentation entitled “Cybersecurity 101: Protect Your Practice Against Hack Attacks.” The Temple Law Alumni Association held the meeting at Blank Rome …

Capsicum Commentary Featured in The New Jersey Law Journal

Capsicum’s Leeza Garber, Esq. was quoted in David Gialanella’s article in The New Jersey Law Journal: “Universities ‘Peculiar Creatures’ in Cybersecurity World.” In discussing cyberattacks and DDOS attacks on universities, Leeza commented that: “It makes me think of a nation-state versus some kid in his basement just trying to cause damage,” said Leeza Garber, corporate counsel and director of business development at technology consultancy Capsicum Group in Philadelphia, which got its start as the technology arm of law firm Pepper …

Capsicum’s Leeza Garber Authors Legal Intelligencer Article re: Firm Tech Issues

Capsicum’s Leeza Garber authored an article in The Legal Intelligencer entitled “Clinton’s Private Email Server Highlights Firm Tech Issues”. The original article is available here. Another development recently surfaced in the Hillary Rodham Clinton private email server controversy. The former secretary of state, who used a private email server located at her personal home in Chappaqua, New York, to conduct official government business, apparently wiped the server clean. The Clinton team also refused to turn the server over to an …

Capsicum Featured in Legal Talk Network Podcast

Capsicum Group’s Leeza Garber discussed online reputation, privacy, and the law during a recent Legal Talk Network podcast taped in New York City. Alongside three other panelists, Leeza engaged in an in-depth conversation regarding data breaches, the right to be forgotten, and whether “privacy is a thing” anymore. Find the podcast here:  http://legaltalknetwork.com/podcasts/special-reports/2015/03/atl-converge-online-reputation-privacy-law/.

Top Four Incident Response Lessons Learned From The Anthem Hack

The magnitude of the Anthem computer network hack is still causing aftershock.  While the breach itself was uncovered in early February, a few weeks later it was determined that the data of millions of children covered by the health insurance giant has also been exposed.  Now, they too will be vulnerable to identity theft.  The numbers associated with this breach are staggering and continue to grow:  approximately eighty million Social Security numbers, addresses, phone numbers, dates of birth, names, employment …

The Rise of Ransomware and the Future of Cybercrime

On January 2, the New York Times published an opinion piece entitled, “How My Mom Got Hacked,” a review of one woman’s experience helping her mom traverse the complex, and unfortunately growing, landscape of ransomware.[1] Ransomware is a type of malware that encrypts a system’s data, thereby restricting access to that data until a certain amount of money – the ransom – is paid. At that point, the cybercriminal will (allegedly) provide the encryption key. Typically ransomware attacks are carried …