By Michael Kemps, Innovative Computing Systems | December 1, 2021
Vulnerability makes us dependent on others, and as the start of this decade has shown, we are all vulnerable to varying degrees. The best way to protect those inherent parts of systems and processes exposed to manipulation and misdirection is cooperation in building resilient systems.
By David Kalat, BRG | November 30, 2021
What if a 'Really Nasty Virus' isn't a virus at all? This month's look at the history of cybersecurity examines early virus hoaxes—and how they interacted with real threats.
By Emil Sayegh, Ntirety | November 24, 2021
For all of that is created and consumed during October's Cybersecurity Month, it is disappointing to see how each year after all the thoughts have been shared, major security incidents continue to emerge. We need to begin to take stock of all the advice given during this month and put it to immediate practice.
By Mike Paul, Innovative Computing Systems | November 19, 2021
This article looks at each stage of a cyberattack, by way of a fictitious attack that took over a real estate agent's email account.
By Victoria Hudgins | November 17, 2021
Cybersecurity questions or audits are still relatively rare for solo practitioners and small law firms. But cybersecurity consultants say those days are numbered as general awareness of cyber threats spreads and insurance standards intensify.
By Victoria Hudgins | November 9, 2021
For many firms, pinpointing cybersecurity costs to a specific client can be challenging, while ethical obligations may prevent them from including cybersecurity line items in a client invoice.
By David Kalat, BRG | November 2, 2021
Before the 1990s, agents staffed the border only for limited business hours, and people frequently would find themselves trapped in the wrong country overnight—until a clever use of biometric technology saved the day.
By Kenya Parrish-Dixon, Empire Technologies Risk Management Group | October 20, 2021
The U.S. doesn't have a federal cybersecurity law, but that doesn't mean there is no cybersecurity industry standard. The combination of older regulations and guidance with new state statutes and federal guidelines provide a basket weave of compliance.
By Victoria Hudgins | October 19, 2021
Even after high-profile law firm data breaches, limited resources and the assumption that hackers wouldn't possibly target them is still a persuasive belief among some firms, observers say.
By Corey Omer and Laila Paszti, Davies | October 18, 2021
While the amended Private Sector Act, the GDPR and the CCPA share many key features, they differ in important respects. Here's how organizations can determine whether they are subject to the Act and formulate a plan to bridge any gaps.
Presented by BigVoodoo
Law firms & in-house legal departments with a presence in the middle east celebrate outstanding achievement within the profession.
The premier educational and networking event for employee benefits brokers and agents.
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
A large and well-established Tampa company is seeking a contracts administrator to support the company's in-house attorney and manage a wide...
We are seeking an attorney to join our commercial finance practice in either our Stamford, Hartford or New Haven offices. Candidates should ...
We are seeking an attorney to join our corporate and transactional practice. Candidates should have a minimum of 8 years of general corporat...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS