Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
On January 24 2025, the UK’s Information Commissioner’s Office (ICO) published its response to a request from the Prime Minister, Chancellor and Business Secretary for regulatory proposals to improve business confidence and...more
WHAT: As we previously reported here, on October 3, 2023, the Federal Acquisition Regulatory Council (FAR Council) proposed a pair of major cybersecurity rules intended to implement key parts of President Biden’s May 2021...more
Thomas Friedman's 2005 book titled The World is Flat discussed how globalization and technology flatten barriers to entry, making the world more competitive. From 2005 to 2021, there is no shortage of examples to highlight...more
The Business Software Alliance (BSA) recently endorsed principles for building trust in the Internet of Things (IoT), highlighting the need for a risk-based approach that accounts for the various components, capabilities,...more
TriDiNetworks, an Israel based cloud management platform for M2M (machine-to-machine) and IoT networks, recently filed three lawsuits against industry leaders in IoT technology for alleged willful patent infringement. Two of...more
The transition from traditional manufacturing techniques and technologies to techniques leveraging automation and data exchange technologies, cyber-physical systems, the Internet of things, cloud computing and cognitive...more
In its latest filing in February 2019, non-practicing entity Akoloutheo, LLC has expanded its Eastern District of Texas patent litigation campaign to include Oracle. Akoloutheo accuses the Oracle Analytics Cloud, Oracle...more
ICT standardization is a key part of the European Union’s package of measures designed to improve Europe’s competitiveness and productivity. As part of the EU’s Digital Single Market (DSM) initiative, the European Commission...more
In this final session of the AutoClassification 101 Webinar series, presented by Epiq/Valora Technologies, Sandra Serkes and Julie Colgan look ahead to discuss “the Future of Information Governance and Content Services....more
It’s that time of the year again, budget season. A time when organizations set priorities on how to strategically spend their money in 2018. In the information technology (IT) world this can be a daunting task for any CIO....more
The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more
The results of a recent study by Gartner, Inc. project worldwide growth of 18% in the public cloud services market during 2017. Gartner also expects the growing public cloud services market—projected to reach $246.8 billion...more
Introduction - Cybersecurity was a prominent factor in 2016 in all aspects of government, business and personal affairs. Russian and other foreign national hacking has the potential to spark a new form of cold...more
Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more
The Internet of Things (“IoT”) connects markets and supply chains around the world. Industry, governments and consumers around the world are embracing IoT technologies to improve research and public policy, to accelerate...more
How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more
Forrester recently issued its “2017 Predictions: Dynamics that Will Shape the Future in the Age of the Consumer,” which among others, makes interesting predictions relating to cybersecurity risks coming up in 2017....more
Davis Wright Tremaine hosted its fourth conference on the legal, regulatory, and commercial landscapes surrounding these rapidly emerging fields. What are the big lessons for your business? Cloud computing and big data...more
Several companies cast an eye toward the Internet of Things, Twitter’s AI gets pretty good at live video, some industry giants get behind the driverless car, and more … Samsung launches a place in the cloud just for...more
Intel and Sony give us an idea of the future of virtual reality; Google goes shopping in the cloud; the FBI warns consumers about car hacking; the Internet of Thing’s language problem; and more…...more
Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more
Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more
Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more