PLEASE SIT DOWN BEFORE READING THIS Is it actually possible that the United States Congress is on its way to enacting legislation that will potentially make regulatory compliance easier for businesses? Over the last half-a-dozen years, while the EU has enacted unified...
Cyber Security & Data Breach
Protecting Your Company’s Confidential Information: Takeaways from Meta’s Lawsuit Against Its Former Employee
Meta Platforms Inc., the parent company of Facebook, Instagram, and other products, recently filed a lawsuit in a California state court against a former vice president for allegedly taking confidential information from Meta to his new employer, an artificial...
You’ve Been Hacked. Who You Gonna Call?
Your company was hacked. You feel panic, embarrassment, anger, fear and confusion. But you must act quickly, logically and decisively to stop the bleeding and protect your business, your customers and your employees. The good news is you are not alone in this fight. A...
Safeguarding Against the Rise of Deepfake Scams: What Employers and Employees Need to Know
A recent deepfake scam has rocked the financial landscape of Hong Kong, demonstrating the extreme lengths to which cybercriminals are willing to go to defraud unsuspecting victims. This sophisticated scheme, which saw attackers coerce an employee into transferring a...
Don’t Take The Bait: How To Prevent A Phishing Attack
It’s late Friday afternoon and the COO of your company emails you with an urgent request to send him the HR spreadsheet you have been working on. Frantic, you immediately reply and send him the requested information. But it wasn’t the COO emailing you; it was a...
Un-Nudify Me: Removal Options for Deepfake Pornography Victims
The AI Deepfake Pornography Pandemic The rapid advancement of artificial intelligence (AI) technology has created new challenges that significantly disrupts established legal principles. One facet of AI, with a large potential for abuse, is its seamless capability to...
SEC Adopts New and Burdensome Cybersecurity Disclosure Rules
The Securities and Exchange Commission (SEC) recently adopted rules requiring public companies to quickly disclose “material cybersecurity incidents” and to annually disclose material information regarding a company’s cybersecurity risk management, strategy, and...
Who’s Liable When Your Cryptocurrency Is Stolen?
One of the asserted advantages of blockchain and cryptocurrency is their operation outside the commercial banking system. However, this very feature poses a challenge when cryptocurrency is stolen—or more accurately, transferred without the account holder's...
Coverage Challenges in Ransomware Claims: Cyber Insurance Policies and Trends in Denials
A consistent pattern emerges in data breach and cyber-attack cases when companies turn to their insurers for coverage after such incidents. Whether they possess specialized cyber insurance or not, insurers often decline claims, citing various reasons such as failure...
Supreme Court Rules in Favor of Online Harasser
Online threats and harassment pose a significant problem in today's digital landscape. With the Internet's global reach, the ease of publishing and posting content, and the potential for anonymity or lack of consequences, individuals find it convenient to share...