Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
In September 2015, in an appearance before the U.S. House Intelligence Committee, then-Director of National Intelligence James Clapper warned that the next “push of the envelope” in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability, instead of the more easily detected deletion or disruption of access to information. With data integrity in question, he explained, decision making by senior government officials (both civilian and military), corporate executives, investors or others could be “impaired.” Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.
By Laura Jehl, Robert Musiala, Linda Goldstein, Fernando Bohorquez and Amy Mudge
While inflated expectations abound, the advertising industry is emerging as one of the more immediate, substantive and compelling use cases for blockchain technology.
By Thomas McThenia and Richard Markow
Like poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.
By Michael Bahar and Kristen Bertch
Technologies are often pitched as solutions, if not game-changing solutions. Indeed, many times they are, but no solution comes without the seeds of its own costs and challenges. For pragmatic and regulatory compliance reasons, it is increasingly important for boards, senior executives and general counsel to sufficiently understand technologies, not just their potential promise.
By Jeffrey Atteberry
The social, economic, and political forces pushing for a comprehensive overhaul of the nation’s privacy regime are numerous, and many see 2019 as presenting the best opportunity yet for passage of federal data privacy legislation.