Cybersecurity
Based on analysis of cyber attack patterns in 2015,, a report from Hewlett Packard Enterprise predicts likely trends in attacks […]
Twitter’s court battle against the Justice Department is heating up, with the government seeking to keep the social media network […]
Some options are becoming institutionalized, by law and by way of voluntary arrangements through providers, but it’s piecemeal. What’s at […]
Google has panted a system called “Encouraging Conversation in a Social Network.” It activates when someone sends an email that […]
The takedown of parts of the Ukrainian power grid in December was highly effective and highly sophisticated. The modus operandi was to…
The recent news surrounding Apple, the FBI, and data privacy and ownership has sparked national debate and raised countless questions. […]
Civil society advocates are dismayed by the lack of progress in establishing a consumer privacy framework. In February 2012, the […]
Employers can adopt fingerprint recognition technology for a variety of purposes, including securing physical or computer access and as an […]
Apple is bracing itself for a lengthy legal battle against FBI attempts to have the company unlock an iPhone that […]
Often when consultants are called in to do a forensics investigation after a suspected breach, they find that in fact…
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.