Patexia. Interest Groups

Cyber Security > Nova Content

On April 20, 2020, the U.S. Supreme Court granted writ of certiorari in Van Buren v. United States to consider whether a person who is authorized to access... Read More »
On August 20, 2020, former Uber Chief Security Officer Joe Sullivan was charged with obstruction of justice and misprision of a felony for knowingly concealing a hack ... Read More »
With the rapid spread of COVID-19, countries around the world are implementing contact-tracing practices, which involve identifying people who may have COVID-19 and... Read More »
Written by: Brian Reece & Melanie Seelig On August 14, 2020, the Office of Administrative Law (“OAL”) approved the final regulations for the... Read More »
In June 2019, Maine’s state legislature passed the country’s first privacy law specifically regulating Internet Service Providers (“ISPs”)... Read More »
In March 2020, Washington state passed the first law expressly regulating the government’s use of facial recognition technology and the service providers who... Read More »
Generally, personal data may not be transferred to countries outside of the European Economic Area (“EEA”) under the EU General Data Protection Regulation ... Read More »
A brand owner discloses almost every week that a security or data breach has occurred. For privacy, operations, and trademark professionals alike, the ramifications... Read More »
With all the buzz about the California Consumer Privacy Act (“CCPA”), it seems easy for businesses to miss or overlook other important state legislation... Read More »
In a recent report, the U.S. Department of Health & Human Services (HHS) Office of the Inspector General (OIG) recommended that the U.S. Food & Drug... Read More »
On July 20, 2018, SingHealth, a Singapore healthcare institution consisting of four public hospitals, five national specialty centers and a network of nine... Read More »
Mitt Romney is the voice of corporate America. At least when it comes to China bashing. Romney promises aggressive tactics when combating China’s intellectual... Read More »
Huawei’s sordid intellectual property past has caught up to them. After nearly a decade of IP property theft accusations from networking gear rivals, last... Read More »
Mobile banking is estimated to be worth $117 billion by the end of this year, according to Gartner.  ACI projects $670 billion by 2015, with 2.5 billion... Read More »
Researchers at MIT's Computer Science and Artificial Intelligence Laboratory evaluated 36 commonly used smartphone applications. Principle investigator Hal... Read More »
Lao Tzu, the famous Chinese philosopher, once said, “time is a created thing.” Interestingly, this 2,500 year old saying -- which was initially said in... Read More »
If Governments and Corporations around the world aren’t on edge over cyber security, after last week’s Black Hat conference in Las Vegas, they should be... Read More »
Big U.S. companies tired of being hacked are striking back in a vigilante effort to stop cyber criminals and Internet espionage. Angry and frustrated over continued... Read More »
The cyber-security community has given Flame mixed reviews after preliminary attempts to dissect the spying malware’s bloated code. Kaspersky Lab called Flame... Read More »
If scientists, inventors and entrepreneurial creators of intellectual property had to visualize their idea of a Nirvana on Earth, it would probably look something... Read More »
Comments
Aurora SterlingWhat an great model and very exciting that some of the traditional power players are taking note. It will be interesting to see how the members during the day/DARPA at night arrangement works out in those locations.
May 30, 2012
Daniel PorterA good point -- I see the ideology behind the sort of person who would participate in a hackerspace as very different from the sort of person the military is looking to align itself with...
May 30, 2012