After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
In this issue:
- A New Accelerator Takes Digital Health Start-Ups to the Next Level
- The Return of the MedTech IPO Market
- Is There a Deal in Your Future? A Guide to Navigating Antitrust Waters
In This Issue:
- Decision in Wyndham Case Provides FTC With Significant Victory
- SEC Announces Cybersecurity Initiative
- Heartbleed Bug Generates Significant Security Concerns
- FTC and DOJ Announce Policy...more
Interest in cryptocurrencies is growing, even after Mt. Gox, formerly the largest international bitcoin exchange, filed for bankruptcy in Japan following $473 million in losses. Bitcoin’s resulting drop in value, from a...more
Cybersecurity has become a dominant topic of the day. The Snowden revelations, the mega-data breaches of 2013, the pervasiveness of invisible online “tracking” and the proliferation of “ data broker” trading in personal data...more
On February 12, 2014, the White House unveiled its final Cybersecurity Framework 1.0 along with a new U.S. Department of Homeland Security (DHS) “Critical Infrastructure Cyber Community (C3) Voluntary Program.” This capped...more
With the occurrence of near daily threats against the nation’s critical infrastructure (CI), cybersecurity continues to be a constant concern of owners and operators of CI, Congress and the Obama Administration. Responses to...more
Today the CFTC and the SEC jointly issued final rules that require regulated entities to adopt programs designed to prevent identity theft – so-called “red flags” rules....more
This is the third of a regular series of posts that summarize and wrap up our latest thoughts that have appeared recently on Ifrah Law’s blogs.
1. Will the Internet Taint a Loughner Verdict?
Is it impossible for accused...more
Find a Science, Computers & Technology Author »
Back to Top