No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
Last week, the Ohio Supreme Court ruled that victims of anonymous online attacks have an extension of time to file a lawsuit, holding that they can file a suit one year from date the targeted publication is discovered. This...more
A December 2021 breach of Lakeview Loan Servicing’s customer data has led to another proposed class action against the company in the U.S. District Court for the District of South Carolina. The breach affected the personal...more
The Internet of Things (IoT) products have become a way of life. There are huge benefits of “smart” products, which interact through the internet to gather and exchange data to provide additional functions, security, and easy...more
Can a former employer’s alleged misconduct defeat a request for injunctive relief against former employees when those departing workers take confidential information and clients to another employer? A federal appeals court...more
With new developments regarding Uber Technologies Inc.’s 2016 data breach coming out almost daily, lawsuits against the company continue to pile-up. We previously reported that within days of Uber disclosing the data theft...more
Financial institutions must meet standards for safeguarding customer data given the particularly sensitive information they hold, and regulators have been stepping up their efforts to provide guidance on just how they must do...more
On October 12, 2016, the U.S. Court of Appeals for the Sixth Circuit denied a petition for an en banc rehearing of its September 12 decision in Galaria, et al. v. Nationwide Mutual Insurance Company (Nos. 15-3386/3387). In...more
In May, the U.S. Supreme Court issued its opinion in Spokeo v. Robins, providing guidance on the “injury-in-fact” aspect of the constitutional standing requirement for putative class action plaintiffs. 136 S. Ct. 1540...more
We previously reported that Medical Informatics Engineering, Inc. was sued over a data breach that occurred in May and affected over 4 million individuals. Thereafter, Indiana AG Gregory Zoeller advised all Hoosiers to freeze...more
An increase in data breach class actions could be the result of a recent decision of the Seventh Circuit holding that allegations of future harm stemming from a data breach can establish Article III standing. The majority of...more
On July 20, 2015, the U.S. Court of Appeals for the Seventh Circuit held in Remijas v. Neiman Marcus Group that injuries associated with resolving fraudulent charges and protecting oneself against future identity theft after...more
Paul Karlsgodt, Leader of BakerHostetler's Class Action Defense team, talks about class actions privacy and litigation issues....more
Over the last week, several high profile celebrities (e.g., Jennifer Lawrence and Kate Upton) have reportedly become the latest victims of internet privacy rights violations. In those cases, hackers supposedly obtained...more
If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more