Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
The term “smart cities” has become popular parlance for municipalities’ attempts to enhance delivery of urban services and infrastructure through information and communications technology. While they may conjure images of...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
Over the last year, companies implemented new digital technology solutions at record levels looking to implement emerging technologies, improve the user digital experience, leverage cloud solutions to store the massive...more
My team and I regularly carry out Data Protection Impact Assessments (DPIAs) according to Art. 35 GDPR with regard to the deployment of Voice Assistants for private and public bodies in Germany. This article shows my...more
Thieves loot some Ethereum; chat apps and the IoT attract unwanted attention; AI detects viruses … and password sharing; and more … - Not surprisingly, chat apps are effective tools for terror groups. (Rita Katz, Wired)...more
The IoT is a criminal cryptojacker’s delight; new patents suggest Walmart may have an eye on virtual reality in its future; MIT Technology Review has a few technologies worth thinking about in 2018; and more … MIT...more
Anyone who has ever bought insurance, resented the premium, contested a claim denial, or piled up hours and papers dealing with insurers would welcome anything that promised to lower their rates. Admiral, a British insurer...more
No doubt, this is big data’s time. Businesses have begun to make decisions based on data and data analytics, rather than relying on gut instincts or business acumen. Data-driven business has proven to be successful, but we...more