Robert McKay discusses his appreciation of the important function of the House of Butter blog, established and run by Sean Hocking. This publication has been continuously engaged in addressing wide reaching and impactful issues concerning the environment and law, the defence and protection of rule of law and in support of those in legal practice who stand up for human rights and equality, rather than simply being focused on profit.
Legal sector analyst Jordan Furlong writes that it’s taken two years of rolling pandemic lockdowns to shake us from our torpid habit of gathering together only to work alone. Over the next decade, a Stanford professor estimates, US workers will spend a quarter of their work time at home — “the number of person-days in the office is never going back to pre-pandemic average, ever.” This has obvious ramifications for corporate office space, employee well-being, and even climate change. But the workplace itself is ground zero for this change, and there will be enormous ramifications in this regard alone. Furlong’s thought provoking essay identifies critical choices that can be made that will result in better outcomes for law firms moving forward.
Since Russia invaded Ukraine, we keep hearing that this war is like no other; because Ukrainians have cellphones and access to social media platforms, the traditional control of information and propaganda cannot work and people are able to see through the fog of war. For these communications scholars and historians, Professors Katharina Niemeyer, Dominique Trudel, Heidi J. S. Tworek, Maria Silina and Svitlana Matviyenko, it is important to add nuance to such claims. The question is not so much what is “new” in this war, but rather to understand its specific media dynamics. One important facet of this war is the interplay between old and new media — the many loops that go from Twitter to television to TikTok, and back and forth.
What use are we in helping to solve difficult global challenges if we’re so depressed and cognitively depleted that we can’t think of the best actions to take? Ukraine doomscrolling can harm your cognition as well as your mood. Professors Barbara Jacquelyn Sahakian, Christelle Langley, Chun Shen and Jianfeng Feng describe their research findings on what to do about it.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to secure your home and office network: FBI: Americans lost $7B in 2021 to Internet crime; The best DNS blockers and firewalls; Bank’s Machine Learning Systems Are Ripe for Sabotage; Blockchain: Financial and Non-Financial Uses and Challenges; and DHS seeks to automate video surveillance on ‘soft targets’ like transit systems, schools.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to make software supply chains resilient to cyber attacks; Russian Invasion Highlights Growing Importance of Open Source Intelligence; Cybersecurity: Internet Architecture is Considered Resilient, but Federal Agencies Continue to Address Risks; and Senate passes major cybersecurity legislation to force reporting of cyberattacks and ransomware.
Articles and Columns for February 2022 Offense v. Defense – The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive …
The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.
The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.
Private investigator Marcy Phelps searches social media and online news for clients on a daily basis and recommends specific sources as useful for asset investigations. Phelps notes that not everything will show up in public records, and news and social media research helps fill in the gaps. Phelps shares a few examples of useful sources and strategies that made a difference for clients.