Latest Posts › Popular

Share:

Can Artificial Intelligence assist with cybersecurity management?

AI has great capability to both harm and to protect in a cybersecurity context. As with the development of any new technology, the benefits provided through correct and successful use of AI are inevitably coupled with the...more

European Commission Approves EU-US Data Privacy Framework for Data Transfers - What Does This Mean for Your Organization?

On July 10, 2023, the EU Commission approved the EU-U.S. Data Privacy Framework (“EU-US DPF”) as a valid transfer mechanism for sharing personal data from European Economic Area countries (those in the EU plus Iceland,...more

New Data Privacy Laws Now Playing at a Theatre Near You (or Coming Soon): Are You Ready?

2023 is shaping up to be a landmark year for data privacy, as comprehensive consumer privacy laws take effect in four states and a fifth state expands its already robust privacy compliance requirements. As part of Womble Bond...more

State of US Data Privacy Law Compliance

In May 2017, the world of data privacy was irreparably changed when four members of the Chinese military hacked into credit-reporting company Equifax, exposing the personal information of nearly 150 million Americans. The...more

Hidden Threats of Exposing Your Phone Number

This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more

The Commercial Gap in Digital Security

The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more

The Worm Turns on Big Tech, New Types of American Threats

I have written recently about the crashing tsunami of change in legal attitudes toward the largest U.S. data, technology and internet companies, especially in the antitrust realm. As we consider whether GAFA critic Tim Wu...more

Data Localization and the Limits of “Everything from Everywhere”

The movement to localize some or all of internet data has grown over the past five years as countries introduce new laws restricting data flows, and others try to boost local businesses by placing burdens on international...more

IoT Security Reaches Center Stage in U.S.

How is a refrigerator like a stoplight camera and a delivery drone? Each of these devices and hundreds of millions of others are part of the internet of things (IoT), meaning that manufacturers are building them with sensors...more

Evolution of Personal Data in U.S. Law

Definitions are important. How we define words sets the context for how we regulate them. In the U.S., the definitions of legally defended private information are changing, affecting the entire scope of information...more

Will the IoT Revolution Be Secured?

Historians believe we have started a fourth industrial revolution where physical, digital, and biological worlds will merge to form the basis of a new economy. One of the key elements of this transformation is the emergence...more

Finding a Test for Reasonable Security Practices: Embrace Complexity and Specifics

Most people have a warped and deeply unrealistic understanding of data security. There is no such thing as absolute security. For a thing to have value, you must be able to access the value – in effect, to use it. In order...more

Epic Battles Apple: I Missed a Spot

On Tuesday I wrote about how Epic Games’ CEO Tim Sweeney was engaging Apple on at least three battlefronts. I missed a battlefront and I’m here today to rectify that mistake. I mentioned Epic’s groundbreaking and lucrative...more

Tech Anti-Trust Fight is More Than a Game

Tim Sweeney, the Colossus of Cary, is fighting even bigger foes – Apple and Google. The multibillionaire chief executive of Epic Games has opened a multi-front war on the tribute that app developers are forced to pay to reach...more

Can Purpose-Built Equipment Bring Blockchain Back as a Tech Solution?

When was the last time you talked about blockchain? Maybe 18 months to 2 years ago when the world was new, Broadway was open, and blockchain was everywhere. And then it wasn’t. Blockchain didn’t leave us, its golden promise...more

Lawsuit Alert: New State Law Affirmative Duty to Safeguard Personal Data

Now a business that was hacked may be successfully sued under state common law by data subjects whose information was compromised in the crime. For the first time, a state supreme court has held that a company that was...more

Ohio Enacts First Cybersecurity Safe Harbor

Tacking an entirely new direction from other US states, Ohio has decided to offer defensive legal protection to businesses who have built a cybersecurity regime around well-known industry standards, even where those...more

White House Releases National Cyber Strategy: Five Benefits for American Businesses

“New threats and a new era of strategic competition” have prompted the White House to roll out a new National Cyber Strategy. As identified below, the Strategy contains important priority initiatives that will advantage many...more

Your Cyber Insurance Policy May Not Cover GDPR Fines and Liabilities

You may be paying for cyber insurance that will not cover the most significant cyber risks faced by your business. Recent studies call into question whether a company can insure against the unprecedented huge fines for...more

Sin Eaters, Moles, and Eternal Damnation: Europe’s Quasi-Religious War Against U.S. Internet Companies

Throughout history, people have waged sectarian fights to protect their beliefs. The Europeans, sitting at a crossroads of two major religions charged with converting the unenlightened, have a particularly combative...more

NIST Cybersecurity Framework 1.1: A blueprint for compliance and assurance

In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more

Brexit: IoT to the rescue?

For retailers, speed and efficiency in supply chains are paramount. With the possibility of a "hard" or "no deal" Brexit, retailers must adapt to a new operating environment. The UK government is exploring the potential for...more

Does GDPR Apply to You?

The EU’s General Data Protection Regulation goes into effect on May 25, 2018. GDPR replaces the EU Data Protection Directive. GDPR can apply to US-based businesses even if they do not have offices or employees in the EU. It...more

Geo Political Cyber Warfare And Your Business

The cyber war battlefield has expanded, and your business is now a fighter and a target. A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more

Do You Need Cyber Insurance or Will Your CGL Policy Be Enough?

In Travelers Indemnity Co. of America v. Portal Healthcare Solutions, LLC, the Fourth Circuit Court of Appeals reverses the recent trend of insurance companies avoiding any liability for data breaches under commercial general...more

27 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide