top of page

Blog


CYBERSECURITY CASE WATCH X2 - Nat'l Sec. Comm'n on Artificial Intelligence & Marriott
Elec. Privacy Info. Ctr. v. Nat'l Sec. Comm'n on Artificial Intelligence, C.A. 1:19-cv-02906 (D.D.C. 2020) Investors and developers of...
Jun 11, 20204 min read


OVERVIEW OF A.I. LAWS IN THE USA
But-for a labor relations law in Illinois, Nevada laws on different types of autonomous vehicles, and a handful of optometry laws that...
Jun 9, 20205 min read


DATA BREACH COUNSEL: LEARN YOUR JOB
Mark Twain said: “It ain’t what you don’t know that gets you in trouble. It’s what you know for sure that just ain’t so.” Socrates said,...
Jun 8, 20203 min read


What is AI Anyways?
In short, Artificial Intelligence or AI is using technology to predict outcomes or patterns. AI takes “unstructured” or random data and...
Jun 7, 20203 min read


Jun 4, 20200 min read


7 INDICATORS OF PHISHING EMAILS
According to Deloitte, 91% of all attacks begin with a phishing email to an unsuspecting victim and 32% of all successful breaches...
Jun 2, 20203 min read


10 Ways to Help Secure Medical IoTs in the Age of Digital Medicine
Hospitals and clinics rely on mobile, internet-connected medical devices (medical IoT devices) to deliver patient care. Many patients...
Jun 1, 20203 min read


FEDERAL COURT UPHOLDS 401K PLAN ADMINISTRATOR COUNTERCLAIMS AGAINST CYBER THEFT VICTIM
On May 27, 2020, the United States District Court for the Eastern District of Pennsylvania issued a landmark ruling in early phases of...
May 29, 20202 min read


Healthcare and Chemical Sectors - Get Ready for Changes!
While cybersecurity threats started with the invention of the World Wide Web, the frequency and intensity of these threats increase...
May 28, 20201 min read


Teams Chat and Zoom Meetings – The Next Wave of Discovery Disputes
Three chapters outline any shock to a civilization: 1) the event itself; 2) the immediate response; and 3) the ricochet effects. Today,...
May 27, 20203 min read


Create a Data Breach Response Plan Before the Inevitable
Preparing to defend and mitigate damage from a security breach is not fun. It is a frustrating and unpleasant use of human and financial...
May 26, 20204 min read


Hackers Use U.S. Laws Against Victims
U.S. victims of ransomware and malware are not chosen randomly. Although many black hat hackers are unaware that white hat activity is...
May 21, 20203 min read


Senate FISA Bill Asserts Privacy Limitations
On May 14, 2020, H.R.6172 - USA FREEDOM Reauthorization Act of 2020 passed the U.S. Senate, extending, amending, and curtailing FISA...
May 18, 20203 min read


Underestimated: Law Firm Data Breaches
Four days ago, the mega-firm of Grubman Shire Meiselas & Sacks (Grubman) was hacked. Now, personal and business information belonging to...
May 15, 20202 min read


3 Cyberspace Solarium Commission Recommendations to Watch in NDAA FY21
Progress on H.R. 6395, a.k.a. “National Defense Authorization Act for Fiscal Year 2021” is non-existent. Presently, it a skeleton bill...
May 14, 20204 min read


May 12, 20200 min read


INSIDER THREATS: C-SUITE EXECUTIVES AND FORMER EMPLOYEES
The COVID-19 pandemic forced several lessons onto American Businesses, one of which is to make cybersecurity a top priority in terms of...
May 11, 20203 min read


Who's Next? Hospitals and Pharmaceutical Companies Suffer Cyber Attacks
On May 5, 2020, the U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s...
May 8, 20203 min read


2 Lessons from Other’s Cyber Law Mi$take$
Unemployment is skyrocketing and businesses are scrambling to lower operating costs to avoid the bankruptcy trustees. In the rush to...
May 6, 20203 min read


Cyber Attacks Increasing Exponentially – The Targets, the Tactics, and Potential Defenses
Since January 2020, zscaler claims “an increase of 30,000% in phishing, malicious websites, and malware targeting remote users[.]”...
May 5, 20203 min read
bottom of page