Posts Tagged: "Cybersecurity"

This Week on Capitol Hill: Data Privacy and Competition, Building the Cybersecurity Workforce, and Reducing Algorithmic Bias

Tuesday and Wednesday are the only busy days this week for tech and innovation hearings on Capitol Hill. In the U.S. House of Representatives, subcommittee hearings on Tuesday will explore transportation innovations to address climate change and growing the talent pipeline for cybersecurity. In the U.S. Senate, the Judiciary Committee gets together on Tuesday to discuss data privacy and competition policy, while the Special Committee on Aging explores technological advances that help Americans with accessibility on Wednesday. Elsewhere in the Washington, D.C. area, The Brookings Institution looks at issues with potential biases in the use of machine learning algorithms and The Heritage Foundation dissects China’s goals for technological and international dominance.

IP and Innovation on Capitol Hill: Week of March 25

This week on Capitol Hill, the House IP Subcommittee convenes its first hearing of the 116th Congress to discuss a recent report from the U.S. Patent and Trademark Office on female inventors, and various other House subcommittees will convene hearings to discuss 2020 budget requests for the National Science Foundation, NASA and the Department of Defense. In the Senate, there are hearings scheduled to look at government oversight of electronic health records as well as cybersecurity issues related to small businesses. In the middle of the week, the Information Technology & Innovation Foundation will host events that will explore proactive strikes by companies against cyber attackers, as well as how immigration issues are affecting STEM fields. The week closes out with a Brookings Institution event looking at consumer data privacy issues and policy reactions from around the world.

IP and Innovation on Capitol Hill: Week of February 11

This week on Capitol Hill, the Democrat-controlled House of Representatives has planned a number of hearings on climate change and antitrust matters, especially where the T-Mobile/Sprint merger is concerned. In the Senate, cybersecurity takes center stage at the Senate Homeland Security and Energy Committees. Elsewhere in Washington, D.C., the Brookings Institution got the week started early with a look at the impacts of artificial intelligence on urban life; Inventing America hosts a half-day event looking at current issues in the U.S. patent system; and the Information Technology & Innovation Foundation examines the future of autonomous vehicles in the freight industry.

California Ahead of Federal Government in Cybersecurity for the Internet of Things

The bill would create a new title within California Civil Code named Security of Connected Devices. The first part of this title would require a manufacturer of a connected device, defined as any object capable of connecting to the Internet and assigned either an Internet protocol address or a Bluetooth address, to equip the device with reasonable security features appropriate to the nature and function of the device, appropriate to the information it may collect or transmit and designed to protect both the device and the information it contains from unauthorized access.

Responding to Ransomware

Ransomware attacks are on the rise, partly because of the ease and anonymity of crypto-currencies. In a typical ransomware attack, cyber criminals invade a computer system and encrypt key data, then threaten to destroy the data unless the victim pays the criminal a relatively minor sum (ranging from hundreds to thousands, or in rare cases, tens of thousands of dollars). Rather than trying to determine whether to agree to ransom terms, spend your time and energy preparing for an attack. Companies should consider a ransomware attack as you would any other cybersecurity breach. That is, it is going to happen, the only question is when. Sound preparation boils down to several key considerations.

Senate Commerce Committee Holds Hearing on Transportation of Tomorrow Including Unmanned Shipping and Hyperloop Tech

One difficulty holding back the further implementation of hyperloop infrastructure is the fact that the new mode of transportation doesn’t fit neatly into existing regulatory framework. In response to a question from Sen. Thune on that subject, Raycroft noted that hyperloop systems were currently under the jurisdiction of the Federal Railroad Administration (FRA). This is despite the fact that certain aspects of hyperloop technology don’t fit neatly into the FRA’s regulatory framework for railroads, including vehicle bodies which are more similar to commercial aircraft. Raycroft said that engagement between the FRA and other agencies within the Department of Transportation could help speed the regulatory process while ensuring that passenger safety remained a top priority. In response to a later question from Sen. Catherine Cortez Masto (D-NV), Raycroft said that, at the current pace, hyperloop technologies would be ready for widespread passenger use during the mid-2020s.

House Small Business Committee Holds Hearing on ZTE Sanctions, Chinese Cybersecurity Threats

Several weeks ago, the House Small Business Committee held a hearing titled ZTE: A Threat to America’s Small Businesses to explore the economic and national security threats posed by the Chinese telecommunications equipment and systems firm ZTE. The day’s discussion focused on ways that American small businesses could protect themselves from ZTE specifically and Chinese-backed entities more generally as well as the mixed signals being sent by the administration of President Donald Trump regarding ZTE.

SafeBreach Announces Issuance of Breach and Attack Simulation Patents After $15 Million Round of Investor Funding

SafeBreach recently announced the issuance of three U.S. patents in the field of breach and attack simulation. This news follows weeks after SafeBreach closed a $15 million series B round of funding involving backing from major payment solutions firm PayPal.

What Does GDPR Mean for Your Business?

It has been a big last couple of years for the European Union in the political and business spectrums; what with Brexit and changes to the cybersecurity paradigm. The latter, in particular, will see even bigger changes once the European Union’s General Data Protection Regulation (GDPR) becomes instantiated into law. The scope of this initiative is as broad as it comes, and will alter how business is done in technology, cybersecurity, marketing and even human resources… GDPR takes measures to ensure that EU citizens have individual rights exceeding any claims made by any company that deals with collecting, processing or storing their data; as such, there are guidelines that cover how an organization should properly track all such information in order to facilitate compliance checks.

The GDPR In Full Effect: What Will Happen to WHOIS?

It has been a long time coming, but the General Data Protection Regulation (GDPR) is almost here. This new privacy regulation requires substantial changes to the collection and storage of data and will affect multiple disciplines, including the brand protection industry. One of the ‘victims’ of the new law is the WHOIS database. How will these changes affect its records?

When Kids’ Toys Are Listening, the FTC is Watching

Chinese toymaker VTech recently settled charges with the FTC in the first-ever case involving internet-connected toys. VTech became a victim of cyber attackers back in 2015, when hackers got access to the company’s online database and compromised accounts of over 11 million, which included data for about 6.37 million children… Today, the key to compliance when dealing with IoT is to “know thyself,” Bahar explained. In other words, take the time to understand what truly is in these smart components, not only from a technical perspective but a legal one. In addition, make sure to make good on your promises. If you tell consumers that you are protecting their data or their privacy in certain ways, make sure you are making good on that commitment.

Investor’s Guide to Safe Cryptocurrency Trading Online

It is no wonder that Bitcoin has recently reached a record of $600 billion in the total market value, and Thomas J. Lee, the head of research at Fundstrat Global Advisors, predicts the total value of Bitcoin to reach $1.2 trillion by the end of 2018… Every digital investor has a special set of goals in cryptocurrency, but whatever your goals online safety measures must be taken. Be sure to consider the fees, accessibility, and liquidity as well as your own safety when choosing a platform for your exchange.

Finjan loses part $40M in Reasonable Royalty Award in Blue Coat case at the Federal Circuit

The Federal Circuit decided that Finjan had not presented substantial evidence that Blue Coat infringed the ‘968 patent. The court also agreed with Blue Coat that Finjan failed to apportion damages awarded for the ‘844 patent to the infringing functionality… This finding by the Federal Circuit reverses $7.8 million in damages related to infringement of the ‘968 patent awarded in district court. The Federal Circuit ruling on apportionment of damages awarded for the ‘844 patent will also cut into the largest portion of Finjan’s damages award.

With 9,043 U.S. Patents, IBM Tops for 25th Consecutive Year

IBM inventors received a record number of U.S. patents in 2017, again blowing past their own previous record to sail past 9,000 issued patents. Over the last 25 years IBM inventors have received patents for such transformative ideas as secure credit card transactions, guiding the visually-impaired using RFID, the world’s fastest supercomputers and earthquake detectors. With more than a quarter-century of innovation under its belt, IBM has continued to work on the most contemporary, relevant problems that exist today. This year alone IBM inventors obtained patents in areas such as Artificial Intelligence, Cloud, Blockchain, Cybersecurity and Quantum Computing technologies.

Here’s why the Equifax lawsuit could have far-reaching consequences

To get the case off the ground, the court will decide whether Equifax can be sued in the first place – it’s tricky, because different federal circuits disagree about when this can happen. So, courts in Delaware, Illinois and Washington DC (for example) would allow the plaintiffs to proceed merely because their data is at risk after a hack. This is pretty easy to show. On the other hand though, New York, Conneticut and North Carolina would need to see not just a leak, but that the leaked data has actually been misused afterwards. Equifax HQ is in Atlanta, the 11th circuit. Although those courts have a history of recognising that difficulty (and so supporting data victim lawsuits), it hasn’t yet come down firmly on the question of risk vs misuse.