Patexia. Interest Groups

Cyber Security > Nova Content

On April 20, 2020, the U.S. Supreme Court granted writ of certiorari in Van Buren v. United States to consider whether a person who is authorized to access... Read More »
On August 20, 2020, former Uber Chief Security Officer Joe Sullivan was charged with obstruction of justice and misprision of a felony for knowingly concealing a hack ... Read More »
With the rapid spread of COVID-19, countries around the world are implementing contact-tracing practices, which involve identifying people who may have COVID-19 and... Read More »
Written by: Brian Reece & Melanie Seelig On August 14, 2020, the Office of Administrative Law (“OAL”) approved the final regulations for the... Read More »
In June 2019, Maine’s state legislature passed the country’s first privacy law specifically regulating Internet Service Providers (“ISPs”)... Read More »
In March 2020, Washington state passed the first law expressly regulating the government’s use of facial recognition technology and the service providers who... Read More »
Generally, personal data may not be transferred to countries outside of the European Economic Area (“EEA”) under the EU General Data Protection Regulation ... Read More »
A brand owner discloses almost every week that a security or data breach has occurred. For privacy, operations, and trademark professionals alike, the ramifications... Read More »
With all the buzz about the California Consumer Privacy Act (“CCPA”), it seems easy for businesses to miss or overlook other important state legislation... Read More »
In a recent report, the U.S. Department of Health & Human Services (HHS) Office of the Inspector General (OIG) recommended that the U.S. Food & Drug... Read More »
On July 20, 2018, SingHealth, a Singapore healthcare institution consisting of four public hospitals, five national specialty centers and a network of nine... Read More »
Mitt Romney is the voice of corporate America. At least when it comes to China bashing. Romney promises aggressive tactics when combating China’s intellectual... Read More »
Huawei’s sordid intellectual property past has caught up to them. After nearly a decade of IP property theft accusations from networking gear rivals, last... Read More »
Mobile banking is estimated to be worth $117 billion by the end of this year, according to Gartner.  ACI projects $670 billion by 2015, with 2.5 billion... Read More »
Researchers at MIT's Computer Science and Artificial Intelligence Laboratory evaluated 36 commonly used smartphone applications. Principle investigator Hal... Read More »
Lao Tzu, the famous Chinese philosopher, once said, “time is a created thing.” Interestingly, this 2,500 year old saying -- which was initially said in... Read More »
If Governments and Corporations around the world aren’t on edge over cyber security, after last week’s Black Hat conference in Las Vegas, they should be... Read More »
Big U.S. companies tired of being hacked are striking back in a vigilante effort to stop cyber criminals and Internet espionage. Angry and frustrated over continued... Read More »
The cyber-security community has given Flame mixed reviews after preliminary attempts to dissect the spying malware’s bloated code. Kaspersky Lab called Flame... Read More »
If scientists, inventors and entrepreneurial creators of intellectual property had to visualize their idea of a Nirvana on Earth, it would probably look something... Read More »
Aurora SterlingWhat an great model and very exciting that some of the traditional power players are taking note. It will be interesting to see how the members during the day/DARPA at night arrangement works out in those locations.
May 30, 2012
Daniel PorterA good point -- I see the ideology behind the sort of person who would participate in a hackerspace as very different from the sort of person the military is looking to align itself with...
May 30, 2012