Cybersecurity for the Internet of Things, or Why the FTC Will Not Help
The Chairman of the Joint Chiefs of Staff emphasizes today the harm that cyberattacks can do and says that the […]
View ArticleA Cybersecurity Vision Better than Today’s State of the Union Draft
What if we not only trashed (as we will anyway) the failed cybersecurity proposals of the past decades to be […]
View ArticleYour Phone as Life’s Platform, & Will the FTC or the FCC fix the IoT?
The most important thing you need to know right now about the Internet of Things (IoT) is that when you […]
View ArticleConnected Cars as Privacy Platforms & Security Networks
NO SURPRISES! intoned the digital advertising guru at the IAPP Global Privacy Summit, preaching the conventional wisdom of the business […]
View ArticleHow the Internet of Things will Recreate Privacy
Backstages are back. Before it has even fully emerged from its multitude of wombs, the Internet of Things (IoT) has […]
View ArticleMillennials Understand Privacy a Lot Better than You Do, The Fix
We are in the middle of one of the most culturally creative periods in human history, and the first in […]
View ArticleSharing, Surveillance & Stalking: Drawing the Line the Internet Needs
For the Internet to work, these will be different: sharing on one side, and surveillance and stalking on the other. […]
View ArticleThe Privacy Platform Wars are ON!
The privacy platform battles we promised clarified and escalated last week as we learned how services may learn from advanced […]
View ArticleYour Privacy Force Field for the Internet of Things
The Internet of Things will teach us all a broader view of privacy as much about what is coming at […]
View ArticleHow LinkedIn Remakes Love of Work and Learning
At its best, LinkedIn cuts through the boundaries and hierarchies that have kept us from working and learning well together. […]
View ArticlePrivacy and Suffering Under the IoT Bodhi Tree
The cyber-savvy Bodhisvatta understood fear, response and recovery and was therefore unmoved by Mara’s frightening cyber army, so the Internet […]
View ArticleHow to Do Vendor Contracts When the Intent of Individual Customers Matters
Before the Internet of Things, the Internet was and is a jungle of context-free adhesion contracts. There’s you, alone, and […]
View ArticleHow Safe Harbor’s Death Empowers Non-Europeans and Spawns Innovation
Many have recognized that the recent decision by the European Court of Justice (ECJ) on Safe Harbor and the flight […]
View ArticleHappy 2016! A New Open Source Data Law Blog for Data’s Big Year
Happy 2016, in which new privacy legal rights emanating from Europe and complex interplay between data value, privacy, security, terror … Continue reading Happy 2016! A New Open Source Data Law Blog...
View ArticleSwarming Regulation of Personal Data in the US Tech Sector
Sectoral regulation of privacy and information security in the United States has created a complex system for tech innovation, because … Continue reading Swarming Regulation of Personal Data in the US...
View ArticleWhat is Your Plan for the War of the Data Worlds?
The Battleground Seen from the Two Worlds Global organizations need a resilient strategy and actionable plans for dealing with the … Continue reading What is Your Plan for the War of the Data Worlds? →...
View ArticleBeyond Breach: Challenges in Cybersecurity & Coverage
By Jon Neiditz and David L. Cox Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, … Continue reading Beyond Breach: Challenges in Cybersecurity &...
View ArticleCybersecurity to Protect Knowledge Assets — Study with Ponemon
New Study Reveals that Companies Are Unprepared to Protect What Matters Most to Them How are you protecting your crown … Continue reading Cybersecurity to Protect Knowledge Assets — Study with Ponemon...
View Article
More Pages to Explore .....