Cybersecurity

What Are Your Soft Targets For A Cyber Attack?

Based on analysis of cyber attack patterns in 2015,, a report from Hewlett Packard Enterprise predicts likely trends in attacks […]

DOJ Wants To Keep Twitter Quiet

Twitter’s court battle against the Justice Department is heating up, with the government seeking to keep the social media network […]

Confronting Your Digital Estate Plan

Some options are becoming institutionalized, by law and by way of voluntary arrangements through providers, but it’s piecemeal. What’s at […]

New Patent: Links In Emails Become Grist For A Google Algorithm

Google has panted a system called “Encouraging Conversation in a Social Network.” It activates when someone sends an email that […]

Ukraine Power Grid Hack Seen As Warning For U.S.

The takedown of parts of the Ukrainian power grid in December was highly effective and highly sophisticated. The modus operandi was to…

The SBDPH & the FBI: Forcing the Apple from the Tree

The recent news surrounding Apple, the FBI, and data privacy and ownership has sparked national debate and raised countless questions. […]

Slow Federal Progress On Internet Privacy Frustrates Many

Civil society advocates are dismayed by the lack of progress in establishing a consumer privacy framework. In February 2012, the […]

Fingerprint Technology For Employers

Employers can adopt fingerprint recognition technology for a variety of purposes, including securing physical or computer access and as an […]

Apple Could Face Penalties, Jail Time For Defying FBI

Apple is bracing itself for a lengthy legal battle against FBI attempts to have the company unlock an iPhone that […]

If It’s Not A Breach, Don’t Report It

Often when consultants are called in to do a forensics investigation after a suspected breach, they find that in fact…

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top