Bring Back the Hack Back?
In 2017, U.S. House Representative Tom Graves introduced H.R. 4036, known as the Active Cyber Defense Certainty Act (ACDC Act). The ACDC Act, or hack back law, amends the Computer Fraud and Abuse Act of 1986 (18 […]
Exploring technology law in cyberspace
In 2017, U.S. House Representative Tom Graves introduced H.R. 4036, known as the Active Cyber Defense Certainty Act (ACDC Act). The ACDC Act, or hack back law, amends the Computer Fraud and Abuse Act of 1986 (18 […]
A cyber breach incident requires a rapid response to meet the intense scrutiny by regulators. Companies must plan for recovery by having the tools in place to find the source of a breach. BIA, a leading e-Discovery […]
Lawmakers are considering the passage of a national data privacy law that will resemble Europe’s General Data Protection Regulation (GDPR). Meanwhile, Big Tech is feeling the effects of the European law. In early 2019, Google received […]
Most companies use various types of tech devices and systems to run their businesses. As a result, each type of technology has its own risks of being hacked. A business can establish a culture of best practices […]
All companies should be ready to react to a cyber incident. A cyber attack will cause panic and confusion for a business. Having a cyber response plan in place is critical so a company can experience a […]
To increase the adoption of Bitcoin, developers are creating new ways to sustain growth and attract new users. A Bitcoin faucet is a web application that provides a rewards system where users can earn small […]
Security problems discourage the growth potential and long-term acceptance of blockchain innovations. As blockchain technologies attract more users, companies are looking for stronger ways to secure their platforms. Every day, more than 100,000 users are joining […]
A cyber insurance policy transfers risk to an insurance company for losses involving a cyber breach. However, a cyber insurance policy is not a substitute for implementing adequate safeguards to secure an organization’s network. Cyber […]
Congressional committee findings show that cyber crimes pose a “severe threat” to the economic strength of the United States. The committee found that the threat continues to grow because law enforcement has limited resources to respond […]
Most states have data breach laws that require companies to secure the personal data of their customers, yet WIRED reported that only 50% of websites use the Internet’s secure HTTPS protocol. With the release of Chrome […]