While Preparing for the Whyte Walkers, Hackers Breach the Wall

The ongoing saga of the HBO data hack demonstrates the challenges of protecting the myriad types and locations of sensitive data in today’s digital environment. With data breaches happening more often, and with every type of business at risk, companies must go beyond standard InfoSec practices to identify and protect sensitive data. The HBO hack and other similar breaches demonstrate that, despite the increased focus on data security, it still isn’t enough.

Florida Leads the Way in Requiring Technology CLE – Let’s Hope Others Follow

Florida’s Supreme Court recently approved a proposal mandating that Florida Bar members complete three credit hours of continuing legal education in technology every three years, making it the first state bar to impose such a requirement on its attorneys. Hopefully other states will follow suit (and quickly), given the potential consequences when lawyers lack the technology skills basic to their practice.

Ripped from the Headlines: Automobile Cybersecurity and the Internet of Things

n Sunday night’s episode of the CBS television show CSI: Cyber, a hacker “cyber-jacks” automobiles—some empty, some with drivers behind the wheel—and uses them as remote-controlled cars to cause deadly crashes. As I watched the show, I couldn’t help but think back to my blog post earlier this year about the security vulnerability of our cars (and other devices we use every day) that are connected to the Internet of Things. Is the premise of the television show pure fiction? Exaggeration of a minor threat for dramatic effect?

The Internet of Things — Let the Litigation Commence

Legal commentators have been speculating about how the “Internet of Things” could generate a flood of new litigation. Some of that speculation recently became reality, when plaintiffs filed a class action against a group of automakers, alleging that they sold unsafe cars because their internet connectivity creates vulnerability to hackers.

Data Security and Data Breaches – A Summer Reading List

Ah, summertime . . . Colleagues and friends are heading to the beach, gathering up their summer reading collection. But right now I’m not focused on page-turning thrillers or rom-com novels. Instead, I’m thinking about data security and privacy. I’m exploring the factors that heighten the risk of a data breach, the staggering impact a breach can have on an organization, and how companies can minimize their risk of a breach.