Don’t forget you can visit MyAlerts to manage your alerts at any time.
Coverage across state and federal laws and international cybersecurity regulations as well as the measures and technologies used to comply with them. Also cover breaches impacting law firms and find the legal angle for those covering corporations. Litigation ensuing from breaches is covered as well.
By Adam Harrison & Nebu Varghese, FTI Consulting | December 21, 2023
While Red Teaming has been a longstanding practice in traditional cybersecurity, its application in the AI landscape is relatively novel, and it constitutes a crucial component of the solution for the secure implementation and utilisation of AI technologies.
6 minute read
By Charles Toutant | December 20, 2023
"Cyber-criminals can cross-reference two sources of PHI to marry unregulated data available elsewhere to criminally stolen data with an astonishingly complete scope and degree of accuracy in order to assemble complete dossiers on individuals," the suit said.
3 minute read
By Amanda O'Brien | December 19, 2023
Dietrich Law, with three attorneys, has a focus on representing senior care facilities.
4 minute read
By David J. Shannon | December 19, 2023
In confronting unprecedented circumstances, insurers and insureds need to confirm that their business insurance policies and data security practices protect them from any operational interruptions.
5 minute read
By Brandon Hollinder | December 19, 2023
This article covers cyber trends and tips for organizations to explore in order to be better equipped to anticipate and respond to cyber incidents before a devastating breach occurs. The outcome? Diminished chance of class action activity, compliance violations, lost business, and mounting costs.
22 minute read
By Maria Dinzeo | December 18, 2023
"Not only is this terrifying because it can happen to any organization that's building software, but it's actually also incredibly difficult to detect," said Dan Draper, founder of CipherStash.
7 minute read
By Kasvi Sehgal | December 18, 2023
The same attackers were behind a data breach at Allen & Overy last month, with experts at the time suggesting the firm may have to pay out several million to avoid confidential information being published.
2 minute read
By Kasvi Sehgal | December 18, 2023
The same attackers were behind a data breach at Allen & Overy last month, with experts at the time suggesting the firm may have to pay out several million to avoid confidential information being published.
2 minute read
By Kai Pfiester | December 15, 2023
There are essentially only five paths an attacker can take while performing a cyberattack on a target, and the MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a knowledge base that describes the actions and behaviors of cyber-attackers across various stages of the cyberattack lifecycle.
8 minute read
By Johnathan Bridbord, FTI Technology | December 15, 2023
As cyberstalking, online harassment and other similar issues continue to grow in frequency and complexity, digital forensics will be an important element in supporting the justice process with user attribution.
5 minute read
Presented by BigVoodoo
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
Consulting Magazine recognizes leaders in technology across three categories Leadership, Client Service and Innovation.
Celebrate outstanding achievement in law firms, chambers, in-house legal departments and alternative business structures.
We are seeking an associate to join our Employee Benefits practice. Candidates should have three to six years of employee benefits experienc...
Associate attorney position at NJ Immigration Law firm: Leschak & Associates, LLC, based in Freehold, NJ, is looking for a full time ass...
Seeking a compassionate and experienced estate administration attorney for growing boutique estate planning and elder law practice. Huge eq...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS