Blog

Labeling Devices for Cybersecurity Protection

October 21, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks

By: Christopher A. Iacono

Takeaway: Security labels on internet-connected devices are on the horizon for companies that manufacture and want to sell such devices worldwide. Last week, the White House National Security Council announced plans for a consumer products cybersecurity labeling program aimed at improving digital safeguards on internet-connected devices. On October 19, 2022,... Read More

CISA Announces New Binding Operational Directive to Manage Federal Civilian Agency Threats

October 6, 2022
Blog, Cyber Security, Insights & Impact Business Blog, The Privacy Hacks

By: Mary Kate McDevitt

Takeaway: The latest directive from CISA will enhance federal agencies’ ability to identify vulnerabilities in their networks to prevent and respond to cybersecurity incidents. On October 3, 2022 the Cybersecurity and Infrastructure Security Agency (CISA) announced Binding Operational Directive (BOD) 23-01 entitled Improving Asset Visibility and Vulnerability Detection on Federal... Read More

Requirements of Cybersecurity Expert Testimony in the Third Circuit

September 14, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks

By: Christopher A. Iacono , Quintin DiLucente

Takeaway: In many data breach cases, a cybersecurity expert may evaluate whether the company’s security measures were reasonable and appropriate or, alternatively, if the company lacked the requisite technology to detect a breach. In some circumstances, however, a party’s proposed expert may be challenged on the basis of unfair prejudice.... Read More

Decoding the Recent Apple Security Updates

August 24, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks

By: Christopher A. Iacono , Mary Kate McDevitt

Takeaway: The recent vulnerabilities in Apple software has exemplified the importance of patch management and keeping devices up to date with the latest operating systems and software in order to protect the security of devices. The recent data breach reported by Apple, Inc. (“Apple”) has once again brought global attention... Read More

What Practices Should a Small Vendor Consider When Applying for Cyber Insurance

August 16, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks

Takeaway: As cybersecurity risk increases, large enterprises and government agencies are, increasingly, forcing smaller vendor companies to obtain cyber insurance to help manage the risk of a data breach. To prepare for an annual cybersecurity insurance renewal or initial application, consider the following practices which could help address the risks... Read More

Governor Wolf Signs Bill to Aid Pennsylvania State and Local Government in Fighting Cybercrime

August 9, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks

By: Christopher A. Iacono

Takeaway: Governor Wolf signed a bill that authorizes the governor to order the Pennsylvania National Guard to assist local governments and private entities with cybersecurity support, training, and more. On July 7, 2022, Governor Wolf approved House Bill 2412, which authorizes the governor additional powers under Title 51 to order... Read More

Contractors Beware – Cybersecurity Litigation on the Rise Under the False Claims Act

August 4, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks

By: Quintin DiLucente

Takeaway: The DOJ’s Cyber Fraud Initiative and qui tam actions under the False Claims Act represent signification enforcement mechanisms for cybersecurity contractor compliance. On the eve of 2022, the United States began imposing new, punitive cybersecurity measures aimed at making the internet a safer platform for businesses to share and... Read More

Hacking Your Health: Can Your Electronic Health Record be Hacked?

July 29, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks

By: Christopher A. Iacono

Takeaway: With ransomware attacks increasing over the past few years, healthcare organizations can expect hackers to make ransom demands while holding their computer systems hostage. Everything comes back in style. In the 90s, computer hackers learned how to infiltrate networks, hold them hostage, and demand payment to make them functional... Read More

News & Events

Related News

20 Pietragallo Lawyers Named in 2025 Pennsylvania Super Lawyers and Rising Stars
May 22, 2025
Pietragallo is pleased to announce that 20 lawyers have been named to the 2025 Pennsylvania Super Lawyers and Rising Stars list. Read More
22 Pietragallo Lawyers named in 2024 Pennsylvania Super Lawyers and Rising Stars
May 17, 2024
Pietragallo is pleased to announce that 22 lawyers have been named to the 2024 Pennsylvania Super Lawyers and Rising Stars list. Read More

Upcoming Events

Pamela Coyle Brecht and Marc S. Raspanti to Present Discovery in FCA Litigation
May 11, 2026
On May 11, 2026, partners Pamela Coyle Brecht and Marc S. Raspanti will be presenting “Discovery in FCA Litigation: Building Bridges to and Avoiding Pitfalls,” hosted on myLawCLE, an opportunity made possible through the firm’s sponsorship of the Federal Bar Association’s 2026 Qui Tam Conference. Read More
View More News & Events