No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Fintech Focus Podcast | Responding to a Cyber Attack – Key Considerations for GCs and CISOs
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
The Justice Insiders Podcast - Human Beings: Cybersecurity's Most Fragile Attack Surface
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Life With GDPR – Lessons Learned from The Singtel Opus Data Breach
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
2023 DSIR Deeper Dive: State Privacy and Data Collection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
No Password Required: Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a Guy With a Mildly Exciting Expense Account
Compliance & Disaster Preparedness
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 157: Sarah Glover, Maynard Nexsen Cybersecurity Attorney
Overview of Cybersecurity in Government Contracts
Episode 282 -- CISO and CCOs -- The Evolving Partnership
A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more
This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more
As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more
In a reminder that open source products can carry significant risks beyond intellectual property, a vulnerability in a compression tool commonly used by developers has triggered widespread concerns....more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
The race to develop AI and calls to regulate it are heating up around the world. In November 2023, 28 countries, including the United States, United Kingdom, China, and the European Union, met and pledged to work together to...more
The Fiscal Year 2024 National Defense Authorization Act (“FY2024 NDAA”) continues the national security imperative to enhance the country’s scientific and technological developments and to adopt emerging technologies and...more
Rec Room, Inc. (Rec Room), developer of the eponymous Massive Multiplayer Online (MMO) video game Rec Room, has sued one of its players in a Washington federal court for violations of its terms of service arising from the...more
The Environmental Protection Agency’s (EPA) rush to push billions of dollars of grant assistance to recipients has created the potential for devastating cyberattacks and intellectual property theft on water/wastewater...more
The Cryptocurrency Revolution and President Biden's Formal Recognition - Out of the ashes of the 2008 financial crisis, Bitcoin sprang up like an insurgency, targeting both the unbridled activity of large financial...more
Join Us for Protecting Trade Secrets & Gaining a Competitive Edge in the Digital Age - Sophisticated Strategies to Protect Critical Assets When Key Employees Depart & Business Relationships Break Down - The protection...more
Assignment and Recordation of Patent Ownership Rights - A patent has the attributes of intangible personal property: it can be sold or mortgaged; it may be bequeathed by a will; and it may pass to the heirs of a deceased...more
Ransomware and other cybersecurity attacks have made national headlines during the past 12 months, and public pension systems are as susceptible to these attacks as any other organization. In this episode of Public Pensions &...more
VIDEO: Cryptocurrency - Legitimate Uses and Potential Issues - Following the recent publication of the U.S. Attorney General's cryptocurrency enforcement framework, Spilman attorneys Corey Bonasso and Nick Mooney discuss...more
On 30 July 2020, the EU designated the first individuals and entities under its 2019 sanctions framework targeting parties involved in cyber-attacks that undermine the EU’s integrity, security and economic competitiveness....more
With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more
The U.S. market is improving, with employers adding 2.5 million jobs. For some perspective, “[t]he economy shed 22.1 million jobs combined in March and April.” So, we have a ways to go before we’ve fully recovered. ...more
On May 13, 2020, the Federal Bureau of Investigation (FBI) and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) issued a joint Public Service Announcement (PSA) about a threat to...more
Autonomous cars, sports betting, and CBD products have burst onto the scene, setting the stage for major developments in how companies do business and how regulators monitor new innovations....more
This is the third alert in our series on the risks to corporations, including financial services firms, posed by “deepfakes”—a type of technology, powered by artificial intelligence and machine learning, that can be used to...more
The National Cyber Security Centre (NCSC), an organisation of the UK Government that provides cybersecurity advice and support for the public and private sector, published an article earlier this year relating to a recent...more
On 17 May 2019, the EU put in place a new legal framework for sanctions targeting malicious cyber activities from outside the EU that threaten the Union or its Member States. The aim is to enhance the EU's cyber resilience...more
In the latest edition of The Fine Print we highlight our Melbourne attorneys in addition to articles covering intellectual property due diligence, protecting your personal information in light of the Starwood/Marriott data...more
The U.S. Patent and Trademark Office (USPTO) announced last week that it has discovered unauthorized users have attempted to hack into its online trademark system to attempt to make unauthorized changes to active trademark...more