Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more
Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more
Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more
The FTC continues its focus and concern on use of technologies that integrate artificial intelligence, this time turning to potential consumer harm with voice cloning technology. Today the commission announced a challenge...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
The latest phase of digitization in manufacturing or “smart manufacturing” has transformed the automotive industry. Through the growing use of artificial intelligence (AI), machine learning, and automation, auto manufacturers...more
NIST continues to work on several cybersecurity and privacy workstreams of interest to the private sector. While NIST has traditionally supported federal agencies’ IT security, over the past several years it has taken on (and...more
As the global economy faces the third year of the pandemic, manufacturers are no longer focused on figuring out when things will return to “normal.” Instead, they are applying lessons learned from the past few years to become...more
Thomas Friedman's 2005 book titled The World is Flat discussed how globalization and technology flatten barriers to entry, making the world more competitive. From 2005 to 2021, there is no shortage of examples to highlight...more
Find out why implementing sound sustainability initiatives can open new opportunities for integrating effective digital transformation strategies in all areas of a business....more
The UK 5G debate is emblematic of protectionist sentiments in the technology sector. Huawei and the technology cold war - Huawei Technologies Co., Ltd. is a modern Chinese success story. A pioneer in the telecommunication...more
Whether thinking about managing oil and gas, water or other infrastructure facilities, or considering industrial efficiency, robotics and automation, you may be pondering how the Internet of Things (IoT) can be used to...more
Jason Lohr (San Francisco) held the first in a series of internal webinars on the basics and legal implications of artificial intelligence (AI) and machine learning, highlighting their relevance to IPMT....more
Thieves loot some Ethereum; chat apps and the IoT attract unwanted attention; AI detects viruses … and password sharing; and more … - Not surprisingly, chat apps are effective tools for terror groups. (Rita Katz, Wired)...more