Providing a Safe Harbor From Liability for Software Producers

Providing a Safe Harbor From Liability for Software Producers

| | Cybersecurity, liability
An image of a life preserverOn March 2023 the White House released a new National Cybersecurity Strategy . The strategy outlines a list of 5 pillars the White House considers critical to improving ...
data cybersecurity software CISA ransomware cybersecurity protect data c-suite

Wading Back Into the Software Liability Cesspool

Time must be a flat circle—it seems that every couple of years, someone brings up the topic of software liability. Just stay in one place, and soon enough, the train will come ...
Security Boulevard
CCTV MONITORING REMOTE

CCTV Remote Surveillance Guide: Benefits of Remote Monitoring

Whether the project is a renovation, expansion or a new building, construction projects are typically time-consuming and expensive ventures. Active and ongoing construction projects are worth monitoring for security, accountability and liability ...
Security Boulevard

CEOs Will Be Personally Liable for Cyber-Physical Security Incidents by 2024

Digital attack attempts in industrial environments are on the rise. In February 2020, IBM X-Force reported that it had observed a 2,000% increase in the attempts by threat actors to target Industrial ...
Netskope phishing Qakbot DarkGate ransomware

Texas Court Backs Phishing Attack Insurance Claim

Are insurance companies bound to pay claims for phishing attacks resulting in third-party losses? RealPage, a Texas-based company, operated a rent-servicing portal whereby renters could pay their rent and landlords could get ...
Security Boulevard
Safe Security Bugcrowd

SAFETY Act: A Safety Net for Companies Using ‘Terrorism Certified’ Technologies

In the wake of the attacks on Sept. 11, 2001, Congress enacted the SAFETY Act, which, among other things, encouraged the development of new “anti-terrorism” technologies by giving those developers immunity from ...
Security Boulevard
Legal Hazards of Federated Identity

Legal Hazards of Federated Identity

Beyond the technical complexities of Identity Federation, Thomas Smedinghoff explains what is truly holding back wider-spread adoption of federated identification models. “’Who are you?’ is a fundamental question for all online business ...