By David Kalat, BRG | January 6, 2022
Auditors in 1973 were not expecting to need to audit a company's software in addition to its bookkeeping. But this month's history of cybersecurity explores how Raymond Dirks was able to reveal Equity Funding's fraud—and have a lengthy court battle with the SEC for his efforts.
By Zach Warren | December 30, 2021
From more state privacy laws to biometric technology litigation, attorneys and technology experts foresee a busy 12 months ahead in the privacy space.
By Zach Warren | December 28, 2021
Whether it's new federal and state security requirements, the increased dangers of ransomware, or shifts in cyber insurance coverage, here's what attorneys and legal technologists are watching out for in cybersecurity during the new year.
By David J. Oberly, Blank Rome | December 21, 2021
This first part of a three-part series analyzing key developments in the area of biometric privacy takes a look back at the major developments of 2021 and the current legal landscape as it exists as we enter 2022.
By Jim Krev, iManage | December 15, 2021
You don't have to look far to find bad actors aiming to get their hands on privileged material and then "hold it hostage." Here's some examples of challenges law firms face around protecting IP, as well as some practical approaches they can adopt.
By Victoria Hudgins | December 13, 2021
From Macs being impenetrable to denying the need for password managers and phishing training, some lawyers still have their head stuck in the sand regarding cybersecurity.
By Victoria Hudgins | December 10, 2021
The good news: Law firms are performing incident response table-top exercises. The bad news: Advisers say some aren't doing it right.
By Veeral Gosalia, FTI Consulting | December 6, 2021
Corporations across the globe were already reporting increases in suspicious activity, data leakage, IP theft and other data risks stemming from departing employees and remote workers. Now, existing data and risk implications are likely to be compounded.
By Michael Kemps, Innovative Computing Systems | December 1, 2021
Vulnerability makes us dependent on others, and as the start of this decade has shown, we are all vulnerable to varying degrees. The best way to protect those inherent parts of systems and processes exposed to manipulation and misdirection is cooperation in building resilient systems.
By David Kalat, BRG | November 30, 2021
What if a 'Really Nasty Virus' isn't a virus at all? This month's look at the history of cybersecurity examines early virus hoaxes—and how they interacted with real threats.
Presented by BigVoodoo
The Daily Report is honoring those attorneys and judges who have made a remarkable difference in the legal profession.
Consulting Magazine identifies consultants that have the biggest impact on their clients, firms and the profession.
The National Law Journal Elite Trial Lawyers recognizes U.S.-based law firms performing exemplary work on behalf of plaintiffs.
Associate attorney position at NJ Immigration Law firm: Leschak & Associates, LLC, based in Freehold, NJ, is looking for a full time ass...
Company Description CourtLaw Injury Lawyers is an established Personal Injury Law Firm with its primary office located in Perth Amboy, New J...
McCarter & English, LLP, a well established and growing law firm, is actively seeking a talented and driven associate having 2-5 years o...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS