Meet Phil Leslie, Cornerstone Research's New Chief Technology and Innovation Officer
London Partner Roberta Downey Wired for Disputes: Tech, Infrastructure, and the New Frontier of Risk
Law School Toolbox Podcast Episode 505: Breaking ADHD Barriers with the Help of AI (w/Lindsay Scola)
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
(Podcast) The Briefing: No CTRL-ALT-DEL For the Server Test
Compliance Tip of the Day – Role of Chatbots in Compliance
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
(Podcast) The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Great Women in Compliance: Creating Space to Speak Up: The Story Behind Psst.org
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Compliance into the Weeds: The Role of Compliance Going Forward
A Less is More Strategy for Data Risk Mitigation
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Investment Opportunities in Italy's Tech Market
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Regulatory Ramblings: Episode 44 - The Dangers of Non-Technically Trained Lawyers Advising on Technological Matters with Ronald Yu and Donald Day
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Tips and Trends in Thought-Leadership Marketing
On this episode, we sit down with Mariana Padilla, CEO and co-founder of HACKERverse.ai — an AI-driven platform transforming how cybersecurity solutions are tested and purchased. From her early days in education and...more
SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more
The Current Status of Privacy Laws Across the United States - Unlike the General Data Protection Regulation (GDPR) in the European Union (EU), the United States does not have a nationwide comprehensive data privacy law....more
Crises and uncertainty are inevitable forces in modern business, particularly in cyber and digital. General counsels and legal risk executives are well suited to lead preparedness and resiliency for future crises, uniting key...more
Should hazardous liquids pipelines be prepared to operate “manually” in the event of a future cyberattack? An almost million dollar fine proposed by the Pipeline and Hazardous Materials Safety Administration (“PHMSA”) on...more
The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more
Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more
Is your ETRM system leaving you exposed to cybersecurity threats?...more
Smart speakers – like Google Home and Amazon Echo – have changed the way our homes/offices function. Indeed, these voice-activated speakers execute simple commands provided by voice or smartphone application. With nothing...more
On 11 April 2019 the Hogan Lovells International Arbitration team hosted a seminar on cybersecurity and the internet in International Investment Arbitration. It was a thoroughly interesting and informative session. ...more
The Hackathon brings together multiple streams of entrepreneurial activity (internationally) and taps into a global community of individuals and organizations with a passion for innovation via legal technology. Given that it...more
Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more
Security researchers at Check Point discovered software vulnerabilities in LG IoT devices which allowed them to potentially gain control over LG refrigerators, ovens, dishwashers and a live feed from a robot vacuum cleaner. A...more
The cars we drive to work every day run primarily on computers that collect thousands of data points. Same goes for the factory that manufactured them and the company that designed and sold them. This evolution makes...more
Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more
Over the past year, various institutions and organizations—both domestic and international—have shown an interest in moving the increasingly prevalent cybersecurity conversation offshore. Domestically, both Congress and...more
Last week, there were developments in two cases in different Pennsylvania courts involving employer liability—or lack thereof—for data breaches involving employee personally identifiable information (PII). A Pennsylvania...more
In the wake of the holiday season, it seems that even toys are not immune from privacy and security pitfalls. Two “connected” toys, Genesis Toys’ My Friend Cayla and i-Que robot, have been accused of violating U.S. and...more
How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more
A picture might be worth a thousand words, but could it also be worth a thousand dollars? New technology by MasterCard and Amazon may mean that the new hammock you’ve been eying online is only a camera flash away....more
New NHTSA guidance represents the federal government’s first attempt to develop a comprehensive regulatory structure for automated vehicles. This transformative technology offers vast promises and significant concerns...more
Apple has issued an urgent warning to iPhone users about a crucial iOS update that is the only way to protect iPhones from “the extremely malicious Pegasus software.” According to Apple, Pegasus can completely take over...more
Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more
With the rapid pace of innovation and deployment of intelligent transportation systems (ITS) to enhance existing transportation infrastructure, transportation officials frequently procure and manage sophisticated systems that...more
What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more