Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
According to bloggers on techtarget.com, security risks around the internet of things (IoT) continue to be problematic, and a new free guide, “The Developer’s Guide to IoT” has been published specifically for IoT device...more
Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more
On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more
December has been a hot month for IP law, with important developments in several cases that may significantly impact your intellectual property prosecution and enforcement strategies. Here is a brief summary of each of these...more
Last week, Brian Krebs reported that hackers using a malware dubbed “Marai” have identified hundreds of thousands of home and office devices that have weak security. Then the hackers released the malware publicly so anyone...more
The Federal Communications Commission and the Obama administration recently adopted several important initiatives to facilitate innovation in and rapid deployment of the nascent Internet of Things (IoT). The FCC identified...more
GE’s tech chief discusses gamification and cars; Apple and the FBI’s faceoff continues; Microsoft will give developers a new toy to play with; man’s best friend takes a disliking to man’s made friend; and more…...more
Shiran Kleiderman of K2 Intelligence looks at how wearable technology and the Internet of Things can help boost enterprise security, when done right...more
Technology continues to infuse our homes, businesses, and places of employment. For example, the “Internet of Things” – as it is sometimes called – brings a lot of promise to a wide variety of industries and sectors,...more
Social media discovery is now commonplace within civil litigation, with Facebook continuing to be a primary source of potentially-discoverable information. As technology continues to advance, though, the judicial system is...more
Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more
The “Internet of Things” is the universe of smart devices that talk to the internet or to one another. The devices have unique identifiers and the ability to automatically transfer data over a network on their own, without...more