A Conversation with Alexandra Johnson, CEO/Co-Founder of Rubber Ducky Labs, AI Recommender Systems Pioneer
The Future of AI Regulation and Legislation: 5 Key Takeaways
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 212: Fujifilm’s Investment in North Carolina with Christine Vannais and Laurie Braxton of Fujifilm
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
Podcast - Robots, Rights and New Tech: Balancing Innovation and Data Privacy
DE Talk | How SMBs Can Use AI Hiring Tech in Inclusive Ways
The Briefing: New California Laws for Digital Replicas Both Live and Dead
Exploring AI's Potential in Financial Services With John Sun of SpringLabs — The Consumer Finance Podcast
Due Diligence in AI: Thinking like your biggest critic
Reel Shorts | Labor & Employment: Navigating AI Compliance Risks in Recruiting
AI Discrimination and Emerging Best Practices – Part 1 — The Good Bot Podcast
Due Diligence in AI: 3 things you need to survive AI scrutiny
How can founders navigate the explosion of state AI regulations?
Using Innovative Technology to Advance Trial Strategies | Episode 70
Dan Rudoy Examines the Impact of AI on IP Strategy
The Burr Broadcast: AI in the Workplace
Exploring the CFPB's Stance on AI in Financial Services — The Consumer Finance Podcast
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts: Passle CMO Series Live Podcast
Preventative Medicine: Health Care AI Privacy and Cybersecurity – Part 2 — The Good Bot Podcast
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
The NetDiligence Cyber Risk Summit, which was held September 30-October 2 in Philadelphia, featured panels focused on the latest developments and challenges in cyber risk. Speakers included insurance, legal, and technology...more
Ransomware attacks are hitting record highs in 2024 and show no sign of slowing down as new criminal groups enter the scene and employ a variety of evolving tactics. This post identifies key highlights of ransomware activity...more
Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more
Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more
I always watch what the federal government requires of its employees’ use of technology to get a feel for risks and what is coming down the pike from a regulatory standpoint—this has been going on for years. That’s why I was...more
The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more
EigenLayer TVL Surpasses $20B; New Self-Custodial Wallet Features Launch - According to recent reports, the total value locked (TVL) on the Ethereum network-based EigenLayer restaking protocol recently surpassed $20...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Although artificial intelligence (“AI”) improves how businesses interact with customers, process sales, manage inventory and more, it also heralds new and unique cybersecurity risks. These risks can lead to unprecedented...more
CYBERSECURITY - New Threat: Scattered Spider International Coalition of Hackers - Cyber adversaries in China and Russia continue to be a formidable threat to U.S. based companies. In the past, scams might be detected...more
Start Planning Now to Reduce Your Increased Money Laundering, Sanctions, and Conflicts of Interest Risks The introduction and use of generative artificial intelligence (GenAI) and predictive data analytics (PDAs) by...more
Most everyone in the AI and legal worlds by now knows about the New York Times (“NYT”) suit against Microsoft and various Open AI entities (“OAI”). The NYT alleges copyright infringement by the practice of OAI, and most all...more
From large-scale hacks to new rules governing cyber practices, the cyber landscape continues to become more complex. The risk for breaches is higher than ever before. The numbers support this declaration. According to the...more
CYBERSECURITY - TechRadar's Cyber Predictions for 2024 are Spot On - Because technology develops so rapidly, and “trends” are fast and furious, it is always hard to predict what the big issues will be for the next...more
Chinese authorities have arrested alleged hackers in what appears to be the first-ever reported case of hackers using AI to develop ransomware. These alleged hackers reportedly used ChatGPT to refine the code for their...more
In 2024, businesses will continue to face an evolving landscape of cyber threats, along with an increasingly complex regulatory environment. With heightened scrutiny from regulators, consumers, and investors, the need to...more
The Most Significant Developments in Cybersecurity and Cyber-Related Liability Risks - As we reflect upon 2023, it will unfortunately be remembered as a record-breaking year for ransomware and cybercrime....more
Each year the amount of money laundered in the United States adds up to $300 billion, enough to build 158 Empire State Buildings. Criminals often use the washed cash to fund crypto hacking, terrorism – also known as...more
CYBERSECURITY - New York Governor Proposes Cybersecurity Regulations for NY Hospitals - On November 13, 2023, Governor Kathy Hochul released proposed cybersecurity regulations applicable to all hospitals located within...more
CYBERSECURITY - Hackers Steal $4.4M Crypto Using Data Linked to LastPass Breach - According to Bleeping Computer, crypto fraud researchers at ZachXBT, and MetaMask developer Taylor Monahan have reported that on October 25,...more
Retool, a software development firm offering modular code for customizable enterprise software, recently notified 27 customers that a threat actor had accessed their accounts. The attacker was able to navigate through...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more
Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more