No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
On March 27, 2020, a five-year legal battle between three certified classes of Jeep Cherokee drivers and Fiat Chrysler came to a sudden end, when a federal judge in the Southern District of Illinois held that allegations that...more
Issues of cybersecurity in vehicles are high on consumers’ list of concerns in buying new vehicles. It also impacts public perception of self-driving cars, with a 2017 Cox Automotive survey finding 40% of consumers expressed...more
The cars we drive to work every day run primarily on computers that collect thousands of data points. Same goes for the factory that manufactured them and the company that designed and sold them. This evolution makes...more
Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more
New NHTSA guidance represents the federal government’s first attempt to develop a comprehensive regulatory structure for automated vehicles. This transformative technology offers vast promises and significant concerns...more
Auto-ISAC is not alone in its efforts to address potential cybersecurity risks imposed by connected vehicles. As we have previously discussed, in 2015 legislators introduced the SPY Car Act, which requires automakers to meet...more
A recent Government Accountability Office report outlined vehicle cybersecurity concerns, outlining that hackers can penetrate the technology of vehicles in both long range and short range attacks, including targeting...more
Motor vehicle technology is rapidly changing to enhance safety and provide navigation, mobility, and accessibility solutions for drivers. Manufacturer-installed automatic braking, adaptive cruise control, blind-spot...more
On March 21, 2016, the FBI and the U.S. National Highway Traffic Safety Administration issued a public safety announcement outlining the dangers of cars getting hacked. The announcement follows the media reporting about...more
"Wherefore Art Thou Due Process?" Part III - Why it matters: It is time for another installment in our continuing "Wherefore Art Thou Due Process?" coverage into the ongoing constitutional challenges to the SEC's...more
The Energy & Commerce Committee of the U.S. House of Representatives held a hearing on October 21st titled “Examining Ways to Improve Vehicle and Roadway Safety” to consider (among other matters) Vehicle Data Privacy...more
Late last week, Fiat filed a Motion to Dismiss the proposed class action against it following reports of hacking into vehicle information systems and its announcement that it was recalling 1.4 million Dodge, Ram and Jeep...more
As technology moves forward, more and more of our everyday gadgets will be connected to the Internet. With that convenience may come some vulnerabilities. On July 24, 2015, Chrysler and its parent company FCA US LLC (FCA US)...more
Remember KITT? KITT (the Knight Industries Two Thousand) was the self-directed, self-driving, supercomputer hero of the popular 1980s television show Knight Rider. Knight Rider was a science fiction fantasy profiling the “car...more
Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more
Following on the heels of Senator Ed Markey’s report released in February, the House Committee on Energy and Commerce sent letters on Thursday to NHTSA and various auto manufacturers regarding cybersecurity. The letters seek...more