Category «Cybersecurity»

Pete recommends – weekly highlights on cyber security issues – February 24 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis, Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness.

Subjects: Cybersecurity, Legal Research, Privacy, Social Media

Pete recommends – weekly highlights on cyber security issues – February 22 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis, Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness.

Subjects: Cybercrime, Cybersecurity, E-Government, Legal Research, Social Media

Pete recommends – weekly highlights on cyber security issues – February 16 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis, Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness.

Subjects: Computer Security, Cybercrime, Cybersecurity, Government Resources

The ‘internet of things’ is sending us back to the Middle Ages

The Internet of Things (IoT) has permeated all facets of our lives – professional, family, social – more quickly and expansively than many are willing to acknowledge. The repercussions of IoT are multifaceted – and directly impact issues that span privacy, cybersecurity, intellectual property rights, civil liberties and the law. Law and technology scholar Joshua A.T. Fairfield discusses the ramifications of allowing our environment to be seeded with sensors that gather our personal data using a plethora of devices we now consider to be essential conveniences.

Subjects: AI, Cybersecurity, Intellectual Property, Privacy

The Challenges of a Workplace Bring Your Own Device Policy

John Hawthorne lays out the pros and cons of BYOD policies in the workplace as well as reviewing challenges that arise between employees and IT regarding securing operational data, the lack of clearly articulated and managed use of devices for non work related activities and risks associated with employee activities conducted on personal devices.

Subjects: Cybersecurity, Mobile Technology, Technology Trends