Law School Toolbox Podcast Episode 507: What Do I Need to Do Before the First Day of Law School? (1L Summer Series)
Meet Phil Leslie, Cornerstone Research's New Chief Technology and Innovation Officer
London Partner Roberta Downey Wired for Disputes: Tech, Infrastructure, and the New Frontier of Risk
Law School Toolbox Podcast Episode 505: Breaking ADHD Barriers with the Help of AI (w/Lindsay Scola)
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
(Podcast) The Briefing: No CTRL-ALT-DEL For the Server Test
Compliance Tip of the Day – Role of Chatbots in Compliance
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
(Podcast) The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Great Women in Compliance: Creating Space to Speak Up: The Story Behind Psst.org
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Compliance into the Weeds: The Role of Compliance Going Forward
A Less is More Strategy for Data Risk Mitigation
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Investment Opportunities in Italy's Tech Market
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Regulatory Ramblings: Episode 44 - The Dangers of Non-Technically Trained Lawyers Advising on Technological Matters with Ronald Yu and Donald Day
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more
Never underestimate an operating system update from any mobile phone manufacturer. This week, Apple issued iOS 18.5 which provides enhancements to the user experience, but also fixes bugs and flaws....more
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more
Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more
On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more
WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more
On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more
The productivity paradox: Does more technology mean less growth? Nobel Prize-winning economist Robert Solow famously remarked, “You can see the computer age everywhere except in the productivity statistics.” This paradox...more
Digitale Bedrohungen und Cyberangriffe nehmen jedes Jahr zu – im Jahr 2023 verursachten sie in Deutschland Schäden von über 200 Milliarden Euro, wobei 72% davon auf Cyberangriffe zurückzuführen waren (Quelle: Bitkom,...more
Fragile or volatile supply chains, increases in regulatory obligations and enforcement, natural disasters, inflation, political turmoil – all complicated issues for any business to navigate. Among the myriad business...more
Welcome to our fifth issue of 2024 for our construction industry insights e-newsletter - The Site Report. In our Ask the Attorney segment at the bottom of this e-newsletter, we tap Jonathan Deasy, Senior Attorney in our...more
Transportation services providers are increasingly facing new technology-oriented threats in day-to-day business. Recent cyberattacks and the potential for serious disruption from threat actors have drawn the attention of the...more
On Feb. 27, the FBI and HHS issued a warning urging network defenders to review their joint advisory for healthcare organizations to protect against malicious activity after a ransomware group leader said it will be focusing...more
The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more
According to the Theft Resource Center and its 2022 data breach reports, data privacy and security threats are impacting all aspects of the healthcare industry – from providers to payers to medical device companies to...more
Ransomware trends – specifically related to frequency, cost, and payout – should no longer surprise us. We depend on technology more and more, integrating it into every aspect of our lives. As for data management, there is...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
The third and final installment of this three-part series discusses the construction industry’s evolving landscape and the challenges it faces in the realm of cybersecurity, revealing how a comprehensive, data-centric...more
A recent consent order between the New York State Department of Financial Services (“NYDFS”) and cryptocurrency trading platform, bitFlyer USA (“bitFlyer”), shows that the NYDFS continues to utilize an aggressive enforcement...more
The cost of a cybersecurity breach can range from hundreds of thousands of dollars for middle-market businesses to millions for larger organizations. To protect your company from evolving threats and potential cyber attacks,...more
The world today is too much dependent on technology; we cannot even imagine our lives without the internet anymore. While the benefits brought about by the digitalized world are many, it has also paved the way for commission...more
Artificial intelligence (“AI”) is revolutionizing the workplace, and bringing with it unique cybersecurity challenges. With the increased prominence of AI also comes the need for new cybersecurity approaches....more
Report on Patient Privacy Volume 23, no 1 (January 2023) Ransomware—including increased attacks from criminal groups affiliated with rogue nation-states such as Russia and North Korea—will continue to dominate the health...more
Creating passwords needs to be a challenge, not for you to remember but for others to guess. Yet, the digital world is changing. A single sign-on password is pretty easy for unsavory characters to hack. Statistics indicate in...more