Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
The American Hospital Association (AHA) has warned that information technology (IT) help desks are being targeted in a social engineering scheme that uses the stolen identity of revenue cycle employees or employees in other...more
Cyberattacks affecting internet-connected medical devices like insulin pumps, intracardiac defibrillators, mobile cardiac telemetry, pacemakers and intrathecal pain pumps have increased in recent years. And such attacks show...more
U.S. Government Releases Guide of ‘Minimum Baseline’ Cybersecurity Practices for Protecting Critical Infrastructure - The Cybersecurity & Infrastructure Security Agency (“CISA”) has released a guide to help organizations...more
Malware is an umbrella term for all malicious software. What is malware? Malware is an umbrella term that includes all types of malicious software, including viruses, worms, Trojans, ransomware, and spyware. These...more
California Privacy Protection Agency Releases Revised Regulations - With the effective date less than three months away, and ahead of a Board Meeting on October 28 and 29, the California Privacy Protection Agency released...more
Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up? I grew up in a small town of about 3,500 in rural North...more
CYBERSECURITY - FBI Warns Olympics/Paralympics Participants of Cyber “Activities” - On January 31, 2022, the FBI issued a Private Industry Notification entitled “Potential for Malicious Cyber Activities to Disrupt the...more
Report on Patient Privacy 22, no. 1 (January, 2022) - As the COVID-19 pandemic enters its third year, real “security fatigue” with pandemic-related issues will combine with cybercriminals’ increasingly sophisticated...more
FCC Seeks Public Comment on the Current and Future Regulation of the “Internet of Things” - The FCC is requesting public comment in a proceeding that will help determine the scope and nature of regulation of the “Internet of...more
In an aggressive expansion of its security and privacy enforcement programs, on September 15, 2021, the FTC issued what it characterized as a “Policy Statement” reinterpreting an old rule about personal health records....more
Das Bundeskabinett hat am 8. September 2021 die vom Bundesministerium des Inneren, für Bau und Heimat (BMI) vorgelegte neue Cybersicherheitsstrategie 2021 beschlossen. Die neue Cybersicherheitsstrategie wird die deutsche...more
Thousands of devices connecting to the internet make up the Internet of Things (IoT). While helping to streamline operations and improve productivity, the advantages of IoT are not without risks. Recent federal and state laws...more
Data Breach at New England’s Largest Energy Provider - "A misconfiguration error has exposed personal data belonging to customers of New England's largest energy provider." Why this is important: New England's largest...more
It should be assumed that everything connected to the Internet can be hacked and exposed, now more than ever before. It is commonplace and concerning. Internet of Things (IoT) devices are often developed and sold without a...more
In honor of Data Privacy Day, we provide the following “Top 10 for 2021.” While the list is by no means exhaustive, it does provide some hot topics for organizations to consider in 2021...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
CYBERSECURITY - C-Suite + Managers Pose Higher Security Risk to Organizations - You executives and managers who are in my age group (that is, you didn’t grow up with mobile devices and computers) listen up. According to...more
CYBERSECURITY - Greater Baltimore Medical Center Hit with Ransomware - The Greater Baltimore Medical Center (GBMC) was hit with a ransomware attack over the weekend (December 5-6) that potentially delayed procedures planned...more
The United States Government Accounting Office (GAO) recently issued a report on the cybersecurity risks facing the electric grid. The GAO reviewed the cybersecurity of the electric grid to determine the risks and challenges...more
Join us on Thursday 19 September for the Hogan Lovells Privacy and Cybersecurity KnowledgeShare in London. We will share our latest thinking on the key privacy and cybersecurity issues faced by those with data protection...more
The cybersecurity classified protection regime attracted significant attention when it was included in the Peoples Republic of China (PRC) Cyber Security Law promulgated in 2017 (the CSL). The CSL mandates that network...more
According to a recent FBI Flash, Ryuk ransomware has hit more than 100 U.S. companies since August 2018, with a “disproportionate impact on logistics companies, technology companies, and small municipalities.” ...more