top of page
Blog
Jan 6, 20232 min read
Ransomware Groups - More Organized Than You Think
A critical eye examining LockBit’s Ransomware as a Service organization and its growth since the January 2020 announcement of LockBit 2.0...
Dec 22, 20223 min read
5 Must-Know Tech Concepts for Lawyers
Law school teaches young minds that most answers are found in case law. While there are a few courses on practical skills, there is...
Dec 1, 20224 min read
3 Reasons to Share Cyber Incidents with the “Right” Public Authorities
Private businesses are usually reluctant to share information following or during a cyber incident with public authorities, even those...
Nov 21, 20222 min read
"WHAT DO YOU DO?"
In the 1991 version of Father of the Bride, Steve Martin asks his future son-in-law about his “independent communications consultant”...
Nov 15, 20223 min read
Who Knew About Lloyd's New Cyber Policy Exclusions?
A U.S. mid-term election year was the perfect time (excluding a Presidential election year) to quietly issue a “Market Bulletin”...
Nov 7, 20223 min read
C-Suite: Is this Worth Risking My Personal Freedom?
The October 5, 2022, conviction of Uber’s former Chief Security Officer (CSO) Joe Sullivan, ironically a former cybercrimes prosecutor...
Oct 17, 20223 min read
BNSF Cyber Law Failure Elicits $228M Verdict
In December 2018, a former law partner asked me “Are you proposing cyber law as a transactional or litigation practice?” Actively...
Aug 15, 20224 min read
Beware of Super App
According to internal data, Google recently claimed that over 40% of Generation Z is using Tik Tok and Instagram over Google’s search...
Jul 27, 20223 min read
North Koreans Posing as U.S. I.T. Job Applicants
In the past, bad actors stole personally identifiable information (PII) for a few specific uses. Credit fraud was the principal culprit,...
Jul 25, 20223 min read
Recent Executive Order Does Not Improve Health Privacy
On June 24, 2022, the Supreme Court’s decision in Dobbs v. Jackson Women’s Health Organization, Dobbs v. Jackson Women's Health Org., 142...
Jul 7, 20223 min read
The Bot Scraping Problem
Bot scraping is a decade-old plague for search engines without a cure. This practice allows content thieves to sidestep copyright law, by...
Jun 30, 20223 min read
Cohesion & Accuracy
If ever forced to read Thomas Paine’s bestselling Common Sense pamphlet during American History class, his posit that “It is not in...
Jun 27, 20223 min read
SLTTs: It's Time to Collect on those Federal Promises
While generally opposed to categorical rules, any intelligent individual should appreciate the importance of cybersecurity. A failure to...
Jun 17, 20223 min read
Class Actions: Invest in Dark Web Scans
When data is leaked in or following a breach, many courts do not consider the attenuated and hypothesized chain of events between the...
Jun 11, 20223 min read
A.I. Not Yet an Inventor, but Maybe in the Future?
Recently, a Missouri physicist attempted to introduce a new player in the field of innovation: his self-invented artificial intelligence...
Jun 7, 20223 min read
TikTok’s Privacy Suit Battles Near $100 Million in Damages
TikTok, a social media giant known for allowing its user to upload short videos, continues to battle its reputation for consumer privacy...
May 26, 20223 min read
$63M for OPM Data Breach Victims Pending Approval
The Office of Personal Management (“OPM”), one of the federal government’s largest human resource management entities, and their former...
May 19, 20223 min read
5 States of Consumer Privacy
In two years, 5 states passed consumer privacy acts, which in “law” time (especially with a pandemic), is fast. Beginning with...
May 4, 20223 min read
Cyber Negligence is a Real Claim
Despite limited case law, U.S. Courts consistently treat cryptocurrency like any other movable or intangible product. Although the...
Apr 25, 20223 min read
Surveillance: What's an Intrusion?
With litigation, private investigators, Google Alerts, and social media monitoring are common devices by which to uncover facts and...
bottom of page