No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
Investment Opportunities in Italy's Tech Market
The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Law School Toolbox Podcast Episode 430: The Paxton AI Founders Talk About Their AI Legal Assistant
CMO Series EP100 - Celebrating 100 episodes and exploring the future of professional services marketing
Medical Device Legal News with Sam Bernstein: Episode 10
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Paralegal Insights: A Collaborative Trademark Practice, Series 3
JONES DAY PRESENTS®: Enhancing Trade Secret Protection in Remote Work Environments
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
Podcast: Unpacking FDA's Final Clinical Decision Support Guidance - Diagnosing Health Care
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
ASG LegalTech CEO Soumya Nettimi Talks Covid, Racial Injustice and The Future of Legal Payments: On Record PR
E8: Interview with Cookiebot CEO on Technical Solutions to GDPR Readiness
New Revenue Recognition Standard-Part III, Shaking Up the Software Industry?
Unfair and Unbalanced-Episode 19
FCPA Compliance Report-Episode 286-Use of Technology in Supply Chain Risk Management
Compiling Successful IP Solutions for Software Developers
Drafting Software Patents In A Post-Alice World
Polsinelli Podcasts - Hear How the SCOTUS Ruling May Impact Patent-Eligible Subject Matter for Software
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more
Whether the game is football, baseball, hockey, or Indy Car racing, no team goes into their major championship matchup without training. Companies need to train as well if they intend to operate on the internet and expect to...more
The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more
If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
In the recent case Construction Industry Laborers Pension Fund on behalf of SolarWinds Corporation, et. al v. Mike Bingle, et al. (2022), the Delaware Chancery Court considered whether the directors of SolarWinds Corporation,...more
Ransomware insurance coverage has become increasingly popular in recent years as the threat of ransomware attacks has continued to grow. However, despite the widespread adoption of this type of insurance, there are still...more
On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more
It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more
A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more
CYBERSECURITY - Microsoft Issues Emergency Software Update for PrintNightmare Zero Day Vulnerability - Following the release of a U.S. Cybersecurity & Infrastructure Security Agency (US-CERT) Coordination Center...more
On April 27, 2021, the New York State Department of Financial Services (“DFS” or the “Department”) released a report regarding its investigation into the response by DFS covered entities to the SolarWinds supply chain attack....more
ICYMI, on Wednesday, January 6, 2021, the United States Department of Justice (DOJ) issued an update about what it termed “a major incident under the Federal Information Security Modernization Act”: the global SolarWinds...more
CYBERSECURITY - Further Fall-Out from Russian Hacking of SolarWinds - U.S. intelligence agencies, including the FBI, the Office of the Director of National Intelligence, the National Security Agency and the Cybersecurity...more
Development and Operations (DevOps) teams are often pressured by executives and sales teams to get software products completed and out the door and into the market as quickly as possible so the products can generate income....more
On December 13, the software and service provider SolarWinds announced that its Orion software platform had been the target of a sophisticated cyber-attack that may have resulted in malicious code being pushed to as many as...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
Inside the Privacy Shield Annual Review - Dozens of senior US and EU government officials were joined by officials from data protection authorities in Austria, Bulgaria, France, Germany and Hungary to discuss whether the...more
Depending on the calculation method, what you are may be worth as little as $5. Who you are, however, can be worth much more. Experian recently sent an email linking out to an interesting article on the amount your...more
The U.S. Department of Homeland Security Computer Emergency Readiness Team (US-CERT) recently issued an alert to the public about a vulnerability in old software developed by SAP SE that cyberattackers are using to infiltrate...more
In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more
Editors at Wired magazine recently engaged in a year-long project to develop a means to hack the onboard computer of a Jeep, and override the driver’s control of several critical vehicle functions. According to a disturbing...more
MobileIron, Inc. was sued late last week by shareholders in a proposed class action for allegedly failing to disclose a hacking incident just weeks before its initial public offering (IPO). The suit, filed on behalf of...more
New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more
It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more