NEXT

Legaltech News

Fortifying the Future: The Crucial Role of Red Teaming as AI Assumes Centre Stage

While Red Teaming has been a longstanding practice in traditional cybersecurity, its application in the AI landscape is relatively novel, and it constitutes a crucial component of the solution for the secure implementation and utilisation of AI technologies.
6 minute read

Legaltech News

On the Naughty List? 6 Hurdles OpenAI Faced This Year

OpenAI and its chatbot ChatGPT repeatedly found themselves in the news this year, partly because they best exemplify the recent advances in generative AI, but also because the two sometimes found themselves in hot water.
1 minute read

New Jersey Law Journal

New Jersey Hospital Operator Faces Class Suit Over Data Breach, Alleged Failure to Notify Patients

"Cyber-criminals can cross-reference two sources of PHI to marry unregulated data available elsewhere to criminally stolen data with an astonishingly complete scope and degree of accuracy in order to assemble complete dossiers on individuals," the suit said.
3 minute read

The Legal Intelligencer

Saxton & Stump Set to Absorb Pa. Litigation Boutique in New Year

Dietrich Law, with three attorneys, has a focus on representing senior care facilities.
4 minute read

The Legal Intelligencer

Cybersecurity Threats: A Year in Review and a Look Ahead

In confronting unprecedented circumstances, insurers and insureds need to confirm that their business insurance policies and data security practices protect them from any operational interruptions.
5 minute read

Law.com

The Importance of Cyber Vigilance: Control Liability and Litigation Exposure

This article covers cyber trends and tips for organizations to explore in order to be better equipped to anticipate and respond to cyber incidents before a devastating breach occurs. The outcome? Diminished chance of class action activity, compliance violations, lost business, and mounting costs.
22 minute read

Corporate Counsel

Hackers Increasingly Infiltrate Software While It's Still in Development—Before Guard Is Up

"Not only is this terrifying because it can happen to any organization that's building software, but it's actually also incredibly difficult to detect," said Dan Draper, founder of CipherStash.
7 minute read

International Edition

CMS' Spanish Arm Becomes Latest Victim of LockBit Cyber Attack

The same attackers were behind a data breach at Allen & Overy last month, with experts at the time suggesting the firm may have to pay out several million to avoid confidential information being published.
2 minute read

New Jersey Law Journal

The Five Paths of Cyberattacks: What To Know and How To Be Ready

There are essentially only five paths an attacker can take while performing a cyberattack on a target, and the MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a knowledge base that describes the actions and behaviors of cyber-attackers across various stages of the cyberattack lifecycle.
8 minute read

Legaltech News

Naming John Doe: How Digital Forensics Can Unmask Online Criminals

As cyberstalking, online harassment and other similar issues continue to grow in frequency and complexity, digital forensics will be an important element in supporting the justice process with user attribution.
5 minute read

Resources

  • Why Are So Many Law Firms Suddenly Embracing Digital Transformation?

    Brought to you by AllRize

    Download Now

  • 2025 State Legislative Sessions

    Brought to you by LexisNexis®

    Download Now

  • Retention & Online Reputation for Law Firms: 2025 Guide

    Brought to you by Amazing Workplace, Inc.

    Download Now

  • Europe's Escalating Regulatory Framework: Mapping Efforts to Mitigate Supply Chain Risks

    Brought to you by LRN

    Download Now