Use of IoT devices continues to grow exponentially as companies leverage the impressive data collection abilities of technology to drive exciting developments. It is estimated that by 2025, there will be over 64 billion IoT devices in use worldwide. Expansion is further fueled by the remote working environment arising out of the COVID-19 pandemic. Necessitated
Linda L. Rhodes
Managing Vendor Cybersecurity Risk in IoT Contracting
Use of IoT1 devices continues to grow exponentially as companies leverage the impressive data collection abilities of technology to drive exciting developments.2 It’s estimated that by 2025, there will be over 64 billion IoT devices in use worldwide.3 Expansion is further fueled by the remote working environment arising out of the COVID-19…
2019 Outlook: Cybersecurity and Data Privacy
Cybersecurity and data privacy presented some of the most complex legal questions and business risks that multinational companies faced in 2018. Businesses should expect continued growth in cyber and data privacy challenges in 2019.
Cyber attacks became even more sophisticated and severe in 2018, with incidents ranging from exfiltration and extortion schemes, to attacks on…
Evaluating Open Source Software to Build a Connected Autonomous Vehicle
Automobiles are becoming part of the Internet of Things. “Connected” technologies now power telematics and infotainment systems and increasingly are deployed for driver assistance and to enhance the safe operation of autonomous vehicles. These “intelligent” vehicles rely on an ecosystem of proprietary and third-party components to gather, analyze and then react to data from both…
2018 Outlook: Cybersecurity and Data Privacy
The cybersecurity and data privacy landscape raised new and challenging questions for businesses and governments around the world in 2017. We are poised to see new waves of technological disruption and legal complexity in 2018.
Security and Privacy in the Cloud
As businesses turn to cloud computing solutions and accumulate data in the cloud, they are presented with many challenges for complying with data privacy and cybersecurity regulations. Join Linda Rhodes, Brad Peterson and Joe Pennell on November 14, 2017, for our webinar Security and Privacy in the Cloud. They will cover topics including:
- The background
…
Five Questions General Counsels Should Ask about Security and Privacy Implications of Cloud Services
Businesses today are increasingly turning to cloud computing solutions and accumulating data in the cloud at a staggering pace. Although cloud solutions have many advantages, they also present challenges. For example, cloud providers generally do not customize the cloud environment for any particular customer’s business needs given the multi-tenant nature of cloud solutions. In addition,…
Staying Ahead of the Curve: Cybersecurity and Data Privacy–Hot Topics for Global Businesses
Cyber threats continue to evolve, and data privacy considerations continue to grow more complex. Whether defending against global ransomware campaigns or adjusting to new legal regimes governing international data transfers, companies of all sizes today face unprecedented cybersecurity and data privacy challenges.
Our practical guide, Staying Ahead of the Curve: Cybersecurity and Data Privacy—Hot Topics…
Evolving Issues for Connected and Autonomous Vehicles
As cars and trucks incorporate increasingly sophisticated automation features, the automotive industry must confront the approaching challenge of designing fully autonomous vehicles to operate on public roads. Industry participants—vehicle manufacturers, their suppliers and dealers—will need to think disruptively to mitigate the risks inherent in such a revolutionary shift. This Legal Update by members of Mayer…