No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
In January, Jake Lee and I wrote an article about the merits of using 17 U.S.C. § 1201 to sue video game hack developers. Importantly, § 1201 can be asserted separately from traditional copyright infringement under 17 U.S.C....more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Most everyone in the AI and legal worlds by now knows about the New York Times (“NYT”) suit against Microsoft and various Open AI entities (“OAI”). The NYT alleges copyright infringement by the practice of OAI, and most all...more
Every couple of months a new AI trend or rather hype captures the news headlines. Yesterday, it was image recognition. Today, we are discussing large language models (LLMs). Tomorrow, who knows. But let’s focus on today’s...more
We have already seen one MASS SOFTWARE PIRACY case filed this year by Siemens, and now on the heels of that lawsuit (also filed in Texas) there is another lawsuit filed by Ansys, Inc. filed by the Law Offices of John F. Lumen...more
Supreme Court Rules in Google’s Favor in Copyright Dispute with Oracle Over Android Software - After the Supreme Court's April 6 decision in Google LLC v. Oracle America, Inc., 141 S.Ct. 1183 (2021), the computer software...more
State of Crypto: It’s Time to Talk About NFTs and Intellectual Property Law - "NFTs are all the rage right now, but buyers and sellers should be aware of the different regulatory frameworks that might govern these assets." ...more
Those of us of a certain age (read: old) still recall standing in line at the bank of copy machines in the school library, quarters in hand, waiting to copy a few pages of a key piece of research found in the stacks. Those...more
You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more
The Obama Administration issued a Report earlier this month, entitled "Administration Strategy on Mitigating the Theft of U.S. Trade Secrets," that sets forth its efforts to prevent trade secret misappropriation. The Report...more