Judge Richard Posner served for 35 years and was famous for his reliance on Wikipedia as legal authority for the past 10 years was known for his “restless intellect, withering candor and superhuman output made him among the most provocative figures in American law in the last half-century.”  The New

Continue Reading Judge Posner who relied on Wikipedia retires at 78

The New York Times reported “that hackers had gained access to company data that potentially compromised sensitive information for 143 million American consumers, including Social Security numbers and driver’s license numbers.”  The September 7, 2017 report entitled “Equifax Says Cyberattack May Have Affected 143 Million Customers” included the

Continue Reading Equifax confessed that it failed to protect personal data of 143+MILLION CUSTOMERS!


Reuters reported that “Yahoo must face nationwide litigation brought on behalf of well over 1 billion users who said their personal information was compromised in three massive data breaches.” On August 30, 2017 US District Judge Lucy Koh (Northern District of California- San Jose) in the case of In Re:

Continue Reading Yahoo loses a court battle and a class action will proceed for massive cyber breaches in 2013-16!


Kenneth Vogel (no relation) reported in the New York Times that Google “ helped organize conferences at which key regulators overseeing investigations into the company were presented with pro-Google arguments, sometimes without disclosure of Google’s role.” The August 30, 2017 article entitled “Google Critic Ousted From Think Tank Funded

Continue Reading Google spent $19 million lobbying last year, is that good or bad?


Darkreading reported “some organizations refuse to buy cyber insurance out of the misguided notion that they don’t “need” to worry about being hacked, this mindset isn’t entirely at fault….many enterprises have been left high and dry by cyber-insurance policies that didn’t fully protect them after a major cyber attack.” The

Continue Reading Less than 50% US businesses have cyber insurance, so what can they do to avoid a cyber disasters?


Melinda Gates (think Bill & Microsoft) wrote a perspective in the Washington Post that she & Bill “don’t allow cellphones at the dinner table” which lead to “amazing conversation.” The August 24, 2017 perspective is entitled “Melinda Gates: I spent my career in technology. I wasn’t prepared for its

Continue Reading Gates gives cellphone advice to help avoid the destruction of a generation!


Wired reported about a “Russian espionage campaign has used those Wi-Fi networks to spy on high-value hotel guests, and recently started using a leaked NSA hacking tool to upgrade their attacks.” Wired’s August 11, 2017 report was entitled “Russia’s ‘Fancy Bear’ Hackers Used Leaked NSA Tool to Target Hotel

Continue Reading Watch out! ‘Fancy Bear’ may be ready to steal your data while using hotel wifi!


More businesses should use lawyers that understand how to negotiation cloud agreements because the Click Agreement don’t provide all necessary legal requirements given Cisco’s report that “The cloud is a whole new frontier for hackers, and they are exploring its potential as an attack vector in earnest…They also recognize that

Continue Reading Here’s a good idea – don’t agree to cloud Click Agreements because the cloud is such a huge target for cybercriminals!


Businessinsurance.com reported that a court agreed with Traveler’s “which denied coverage on the basis the loss was not a “direct loss” that was “directly caused by the use of a computer” as required by the policy.” My friend Judy Greenwald wrote the article entitled “Manufacturer can’t recover spoofing email

Continue Reading No cyber insurance coverage for $800,000 loss for spearphishing (aka BEC -Business Email Compromise)!


My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and

Continue Reading GUEST BLOG: Is your business at risk for not knowing about the liability limits under the 911 Cybersecurity Laws (Safety Act)?