News & Analysis as of

Hacking Back

K2 Integrity

The North Korean Crypto Threat

K2 Integrity on

Executive Summary - The North Korean threat to the crypto ecosystem is the highest form of immediate risk to the crypto-economy driven by a regime that seeks to profit from its misuse to reinforce its regime and fuel all its...more

ArentFox Schiff

Privacy Update: FCC Seeks Public Comment on the Current and Future Regulation of the "Internet of Things"

ArentFox Schiff on

FCC Seeks Public Comment on the Current and Future Regulation of the “Internet of Things” - The FCC is requesting public comment in a proceeding that will help determine the scope and nature of regulation of the “Internet of...more

Foley & Lardner LLP

Lower the Gate – Employers Must Take Steps to Restrict Access to Confidential Information

Foley & Lardner LLP on

With the proliferation of technology and cloud-based computing, employers often struggle to provide employees with the tools to allow access to the information they need to effectively and efficiently do their jobs while...more

Faegre Drinker Biddle & Reath LLP

Disruptionware VII: The Evolution of Disruptionware and the Growth of Ransomware as a Service (RaaS)

I have written multiple times about the danger of disruptionware to both Information Technology (IT) networks as well as Operational Technologies (OT) networks of victims globally. As discussed here, many different nefarious...more

Morrison & Foerster LLP - Social Media

Gloom Descends on This Year’s SXSW Interactive

For the third year in a row, Socially Aware co-editor Aaron Rubin and I attended SXSW Interactive, which arguably has become the premier annual gathering for the global tech community. But this year, SXSW Interactive had a...more

Latham & Watkins LLP

“Hacking” Warrants: A Question of Procedure or Substance?

Latham & Watkins LLP on

Typically, the process for amending the Federal Rules of Criminal Procedure is a sleepy affair. Proposed amendments wend their way through a series of judicial committees and, if approved by the Supreme Court, take effect...more

Troutman Pepper Locke

President Obama Signs Cybersecurity Act of 2015 into Law

Troutman Pepper Locke on

On December 18, 2015, President Obama signed into law the Federal Cybersecurity Act of 2015 (the Act). The long-awaited and heavily negotiated legislation recognizes the need for greater cybersecurity threat information...more

Patterson Belknap Webb & Tyler LLP

The Evolving Landscape of “Hacking Back” Against Cyber Attacks

Self-defense is a natural, almost reflexive human instinct. But it has a complicated history in American law, full of contradiction and compromise. Many jurisdictions have long recognized that an otherwise illegal act—such...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide