Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
Malware is an umbrella term for all malicious software. What is malware? Malware is an umbrella term that includes all types of malicious software, including viruses, worms, Trojans, ransomware, and spyware. These...more
FCC Seeks Public Comment on the Current and Future Regulation of the “Internet of Things” - The FCC is requesting public comment in a proceeding that will help determine the scope and nature of regulation of the “Internet of...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
We recently published a blog about a very new and emerging threat coined “disruptionware,” now faced by workforces in multiple industries – especially focused on workers employed in government and in the health care sector....more
DHS Warns Businesses of Risk of Iranian-Backed Wiper Malware Attacks - The tension with Iran has generally increased, and it has been reported that the U.S. has launched a cyber-attack against Iran. In retaliation, the risk...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
Cybersecurity compliance, like the compliance profession, is rapidly growing. The forces pushing cyber compliance are two-fold: the ever-increasing and changing nature of cyber threats and harms, and the logical application...more
Intel has confirmed that a bug in its remote server management tool, known as Management Engine, which allows administrators of IT systems to remote access devices to apply updates or troubleshoot problems for users, allows...more
US-CERT Warns of New Ransomware: Bad Rabbit - The U.S. Computer Emergency Readiness Team (US-CERT) is warning companies in the U.S. about a new ransomware dubbed “Bad Rabbit.” US-CERT stated it has received multiple...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - FTC Comments on Improvements to IoT Device Security - On June 19, the Federal Trade Commission ("FTC") submitted comments to a working group organized by the...more
We often talk about how anything that is connected to the Internet is hackable and unsafe, and to be careful about how you buy and connect devices, products, appliances, home security systems and other wireless “things.”...more
Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more
On January 5, 2017, the Federal Trade Commission (“FTC”) filed a complaint against computer networking hardware manufacturer D-Link Corporation, alleging that the company’s wireless routers, IP cameras, and other “Internet of...more
Cybersecurity hit the news hard in 2016. The number of high profile, and troubling, cyber incidents increased significantly. The Democratic National Committee and one of Clinton’s top advisor’s being hacked, with leaked...more
On October 21, 2016, millions of internet users across the United States were prevented from accessing a number of popular websites, including Amazon, Netflix, Spotify and Twitter. The reason? A hacker had previously...more
Editor’s note: This is the fourth in a continuing end-of-year series. See our previous posts on trade secrets, state regulation and law enforcement, and HIPAA compliance. Our last two posts will focus on the energy...more
How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more
Last week, Brian Krebs reported that hackers using a malware dubbed “Marai” have identified hundreds of thousands of home and office devices that have weak security. Then the hackers released the malware publicly so anyone...more
Powered in part by the growing use of Internet of Things (IoT) technologies, cybersecurity has surged to become one of the leading concerns for global manufacturers, according to a recently released study....more
The Hartford Steam Boiler Inspection and Insurance Company has announced that it is offering “the first personal lines cyber insurance program for consumers, protecting against computer attacks, cyber extortion, online fraud...more