Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
The White House has introduced the Cyber Trust Mark program, a voluntary labeling initiative to help consumers easily identify secure Internet of Things (IoT) devices....more
The Federal Communications Commission has created a voluntary cybersecurity labeling program, also known as the “U.S. Cyber Trust Mark program,” for wireless consumer Internet of Things (IoT) products. The FCC is seeking...more
Key Wireless Deadlines - CISA Seeks Comment on its Zero Trust Maturity Model: The Cybersecurity and Infrastructure Security Agency (CISA) requests comment on its draft Zero Trust Maturity Model. This draft publication is...more
As the NFL and other sports leagues contemplate how to resume operations in the face of the COVID-19 crisis, the availability of data has taken heightened importance as teams conduct activities such as free agency. The...more
The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more
CTIA, a trade association representing the wireless communications industry, recently announced a new cybersecurity certification program for IoT cellular-connected devices. The announcement comes shortly after NIST hosted a...more
I recently purchased an Internet Protocol (IP) camera to monitor my dog, Ruben, during those times that he has free reign of the house. Since “RubenCam” has been online, I’m not sure he has been any less rambunctious, but I’m...more
Manufacturers of wireless devices used for Internet of Things (IoT) applications should take heed of new Trump Administration proposals aimed at reducing the cybersecurity threats from botnets and other automated and...more
On August 1, a bipartisan group of four senators introduced a bill that would impose specific cybersecurity requirements on providers of Internet of Things (IoT) devices when doing business with the U.S. Government and...more
One area of concern for data privacy and cybersecurity professionals is the security of the Internet of Things, which refers to the digitally connected smart devices present in almost every aspect of our lives and growing...more
In a recent article we discussed the growth of wirelessly interconnected devices and the transformative impact it will have for business and more broadly on our lives. In that article we broadly highlighted some of the key...more