No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
The Presumption of Innocence Podcast: Episode 39 - Unthreading the Silk Road: A Conversation With Author Nick Bilton
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Episode 282 -- CISO and CCOs -- The Evolving Partnership
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Understanding the Additional Risks When Making a Ransomware Payment
Fighting the Constantly Evolving Threat of Cybercrimes
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
JONES DAY TALKS®: The eBay Cyberstalking Case: Mitigating the Compliance Risks of Employee Misconduct
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
No Password Required: A Corvette-Driving Research Scientist Who Built His Own Video Games
The College of Patent Agents & Trademark Agents (CPATA) recently issued an alert regarding a surge in fraudulent emails targeting trademark owners. As is typical of these “phishing” scams, the emails often pressure recipients...more
Whether the game is football, baseball, hockey, or Indy Car racing, no team goes into their major championship matchup without training. Companies need to train as well if they intend to operate on the internet and expect to...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Using AI to Build Cyber Resilience for Critical Infrastructure - "Cyber resilience serves as a literal survival strategy, offering a framework to detect threats, understand attacks, recover swiftly, and adapt to...more
The past few months have seen numerous high-profile enforcement actions highlighting an increasing trend, what Deputy Attorney General Lisa Monaco called “the biggest shift in corporate criminal enforcement that I’ve seen...more
Rec Room, Inc. (Rec Room), developer of the eponymous Massive Multiplayer Online (MMO) video game Rec Room, has sued one of its players in a Washington federal court for violations of its terms of service arising from the...more
As we inch closer to the summer solstice here in the Northern Hemisphere (the first day of summer for those of you who were asleep in science class), the heat is not rising only on the thermometer, but also in the halls of...more
VIDEO: Cryptocurrency - Legitimate Uses and Potential Issues - Following the recent publication of the U.S. Attorney General's cryptocurrency enforcement framework, Spilman attorneys Corey Bonasso and Nick Mooney discuss...more
With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more
The 2019 Review of Notorious Markets for Counterfeiting and Piracy provides a list of such markets (the NML), of both physical and virtual (online) varieties. These include...more
Millions of Americans and others around the globe have been told to work from home in order to blunt the spread of COVID-19. In short order, companies have been faced with unprecedented strain on internal networks and demands...more
Trade secrets have, up until recently, been somewhat ignored. When I started to pay attention to trade secrets, some of my colleagues and contacts probably thought that I was mad. ...more
In its traditional Cyber Monday announcement, the U.S. government’s National Intellectual Property Rights Coordination Center (IPR Center), a body managed by the U.S. Immigration and Customs Enforcement’s (ICE) Homeland...more
The purpose of this short paper is to ‘join the dots’ between a director’s fiduciary duties and especially a person holding dual or multiple directorships and trade secrets....more
Fraud presents a constant threat to companies around the globe—and that risk is growing as perpetrators become ever more digitally savvy and creative in their criminal activities. K2 Intelligence has conducted a multitude of...more
Domain name theft (or hijacking) is not a new phenomenon and in fact is a lot more common than most people realise; hence the need to take adequate security precautions in relation to email and domain name registrar accounts....more
In May, SIDN, the Registry responsible for the country code Top Level Domain (ccTLD) extension .NL (Netherlands), published an article on the Ethical Hacker Rickey Gevers and the efforts of the Netherlands to make the Dutch...more
DNS Belgium, the Registry operating the .BE country code Top Level Domain (ccTLD), recently published an article warning domain name owners of the risks inherent in the practice of “snapping”. ...more
As part of a sustained and coordinated effort, law enforcement agencies on both sides of the Atlantic have rounded off their on-going fight against cybercrime known as “Operation In Our Sites” with the traditional annual...more
The Coordination Center, which is responsible for the management of the Russian country code Top Level Domains (ccTLDs) .RU and...more
In the Winter 2017 edition of the Intellectual Property Bulletin, we reported on IP-related changes expected with the incoming Trump administration and the new Congress. Here we look at two such changes currently underway:...more
A great deal has been made of the distinct policy differences between Democratic Presidential Nominee Hillary Clinton and Republican Nominee Donald Trump in such areas as immigration, national defense, crime and taxation. But...more
The conveniences of cloud computing are many, but so are the dangers of doing business in the cloud. For businesses whose intellectual property is accessible in the cloud, there is the constant threat that that intellectual...more
The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more
On October 5, the 12 Trans-Pacific Partnership (“TPP”) countries announced that they had resolved all remaining issues and reached a final agreement on the long-anticipated regional free-trade agreement. As King & Spalding...more