Faegre Drinker on Law and Technology Podcast: The CCPA, CPRA and the Future of Privacy Laws

Share

The California Consumer Privacy Act of 2018 (CCPA) and the California Privacy Rights Act of 2020 (CPRA) are the most comprehensive privacy rights laws passed in any state — and are widely viewed as potential models for future privacy laws. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss sits down with former Faegre Drinker associate Michael Jaeger, an authority on the California privacy landscape, to take a deeper look at these sweeping laws, how they are being enforced and the effect they have had on impacted businesses.

Continue reading “Faegre Drinker on Law and Technology Podcast: The CCPA, CPRA and the Future of Privacy Laws”

FBI Announces Increased Focus on Illegal Financial Transactions Involving Cryptocurrency

Share

Cryptocurrency has increasingly become an accepted form of financial exchange. However, it has also become a favored form of payment for cyber criminals.

In an effort to deter the use of cryptocurrencies in furtherance of criminal activity, the Federal Bureau of Investigation recently announced the formation of a Virtual Asset Exploitation Unit (VAXU). The VAXU will combine various investigatory, technical, and analytical resources, and the unit is charged with tracking the illicit use of cryptocurrencies and assisting in their seizure. This announcement follows close on the heels of the recent U.S. Department of Justice appointment of veteran federal prosecutor Eun Young Choi as the first director of the newly-created National Cryptocurrency Enforcement Team (NCET).

Continue reading “FBI Announces Increased Focus on Illegal Financial Transactions Involving Cryptocurrency”

FTC Warns Companies to Fix Vulnerabilities Associated with Log4j

Share

The Federal Trade Commission (FTC) recently warned private entities to remediate any ongoing Log4j vulnerabilities present within their networks or face possible enforcement action.

Log4j is used to record activities in a wide range of systems, sites, and software found in online products and services. Recently, a serious vulnerability in this popular software was discovered. This vulnerability poses a severe risk to millions of users. Most importantly, the Log4j vulnerability is being widely exploited by a growing set of attackers.

Continue reading “FTC Warns Companies to Fix Vulnerabilities Associated with Log4j”

The Weakest Link? FCC Seeks Information on Security Vulnerabilities in Internet Routers

Share

Over the last several years, the Federal Communications Commission (FCC) has been taking a more active role both in anticipating the need for ever greater communications network security measures necessary to counter threats as well as potentially forging a new role in protecting the integrity of data that flows through the Internet. The latest evidence of this security consciousness is a recent Notice of Inquiry (“Notice”) adopted by the FCC seeking information to better understand the scope of Border Gateway Protocol (BGP) routing system security vulnerabilities, and the means to address them.

Continue reading “The Weakest Link? FCC Seeks Information on Security Vulnerabilities in Internet Routers”

Faegre Drinker on Law and Technology Podcast: A Deeper Dive Into Cybersecurity Frameworks

Share

Last year, we provided a brief primer on prominent cybersecurity frameworks. In this episode of the Faegre Drinker on Law and Technology Podcast, Jason G. Weiss chats with guests Jim Watkins, former deputy laboratory director in the FBI’s Orange County Crime Lab and current certified technical assessor for the ANSI National Accreditation Board, and Nate Shiflett, the director of posture and compliance for Sylint, an internationally recognized cybersecurity and forensics firm, to take a deeper look into the leading cybersecurity frameworks.

Continue reading “Faegre Drinker on Law and Technology Podcast: A Deeper Dive Into Cybersecurity Frameworks”

Capping Cyber Casualties: Steps to Avoid Cyberattacks Flowing From Hostilities in Ukraine

Share

Recognizing that cyberattacks have already commenced and could spread beyond the Russian-Ukrainian battlefield, organizations can take several steps to protect themselves. They can recognize the risk. Then organizations can assess likely cyber threats and vulnerabilities, build resilience and take preventive actions, to avoid becoming another casualty in a conflict that already has too many.

Continue reading “Capping Cyber Casualties: Steps to Avoid Cyberattacks Flowing From Hostilities in Ukraine”

©2025 Faegre Drinker Biddle & Reath LLP. All Rights Reserved. Attorney Advertising.
Privacy Policy