SPY Car Study Act calls for research to secure connected cars
A bipartisan group of legislators recently proposed a bill that would call for industry professionals to study how to secure […]
A bipartisan group of legislators recently proposed a bill that would call for industry professionals to study how to secure […]
“In the wake of a breach, we are going to ask questions and look at disclosures before and after an
The first HIPAA enforcement action of 2017 is also the first of its kind—a stiff penalty by the U.S. Department
A Legalweek panel explores practical approaches to security incident planning, and legal’s pivotal role. Source: In Corporate Cyber-risk Planning, Legal
Could the Internet of Things spark the Ransomware of Things? ESET’s Stephen Cobb investigates how jackware could become a major
Source: Statement of Acting FTC Chairman Ohlhausen on Appointment by President Trump | Federal Trade Commission Chairman Ohlhausen is our
As Data Privacy Day (DPD) approaches, US-CERT recommends that users and businesses learn more about how to protect their privacy
While some changes are fleeting, others could dramatically alter the e-discovery landscape moving forward. Source: LegalTech From Use Policies to Pro
Source: The Future of the FCC and Internet Law in a Trump Presidency | Legaltech News Outgoing FCC Enforcement Bureau
SC Magazine reports the Trump Presidency’s new cyber tsar, former New York Mayor Rudy Giuliani has had his passwords leaked
U.S. Rep. Michael McCaul (R-Texas), chairman of the U.S. House Committee on Homeland Security, is urging the formation of a
Law enforcement attempts to access Amazon Echo raise questions over the viability of IoT data in investigations and the vulnerability
The National Institute of Standards and Technology issued a draft update to its Cybersecurity Framework aimed at forging stronger cybersecurity
Giuliani, who heads a cybersecurity consulting firm, will serve as an adviser on finding solutions to cyber-incursions in the private
Picking apart the recent cybertheft faced by two U.S. firms working on M&A offers lessons on how legal can avoid
Mayer Brown’s Cybersecurity blog has a useful summary of the sanctions President Obama recently imposed in response to the election-related
The full text of the ODNI report is here. Source: ODNI Statement on Declassified Intelligence Community Assessment of Russian Activities
Source: New FTC Contest Confronts ‘Internet of Things’ Security
The European Court of Justice ruled on Wednesday that the UK’s Data Retention and Investigatory Powers Act of 2014 is
A look into the future for the lessons learned from the “hack” of one major firm. Source: Is 2017 the
The more you understand AI software, the better you can appraise its benefits. Source: The Math Behind AI, as Explained
Pizza purveyor Domino’s Pizza has advised its customers by email to change their account password to one which is strong
The Johnson & Bell suit is a good reminder of the importance of questioning outside firms about their cybersecurity efforts.