Blog

Is Kleros a Fair Dispute Resolution System?

Kleros' approach to arbitration is radically different to traditional court systems and alternative dispute resolution methods. Relying on cryptoeconomics, it provides crowdsourced jurors the incentive to arbitrate on various types of disputes. The entire article is available here....
Read more 0

GDPR Trolls

Patent trolls are not a new phenomenon. They buy patents for the sole purpose of extorting and suing companies. Since patent-related litigation proceedings are complex and time-consuming, the fees for defending a patent claim in court proceedings may exceed one million U.S. dollars. Therefore, many legitimate companies (especially startups) prefer to pay the requested settlement fees instead of defending their rights. According to CNN, just within the period 1990 – 2010, patent trolls cost investors 500 billion U.S. dollars. Patent trolls can target a limited scope...
Read more 0

Consequences of the Late Announcement of Cyber-security Incidents

Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on electronic communication networks, provision of services, and national security. Although significant breaches that affect many users or extensively disrupt the functioning of an organization usually receive extensive media coverage, smaller security incidents may remain unreported to the public. This can occur because of several reasons. For example, the affected organization may become aware of the incident later, it considers the incident insignificant (e.g.,...
Read more 0

Tips for Drafting Efficient Employee Information Security Policies

Employee information security policies impose obligations on employees of organizations which aim to reduce the risks of cyber-attacks. Such policies usually contain instructions on how to choose strong passwords, apply patches and updates, detect phishing schemes, protect sensitive information, and respond to information security incidents. There is an abundance of online materials about how to draft a comprehensive employee information security policy. However, many of those materials do not address the disadvantages of such policies. The purpose of this article is to provide tips on...
Read more 0

The Future of Information Security

In this article, we look at the current trends in the field of information security and present speculations as to what the future of the field would be. It should be noted that unpredicted emergence of disrupting innovations may radically change the existing information security landscape. Nevertheless, we may reasonably expect that the future of cybersecurity will be dominated by four trends, namely, use of Blockchain technologies (Section 2), expanding the role of artificial intelligence (Section 3), harnessing the wisdom of the crowd (Section...
Read more 0