Don’t forget you can visit MyAlerts to manage your alerts at any time.
Coverage across state and federal laws and international cybersecurity regulations as well as the measures and technologies used to comply with them. Also cover breaches impacting law firms and find the legal angle for those covering corporations. Litigation ensuing from breaches is covered as well.
By Sue Reisinger | April 17, 2018
US takes action against China telecoms giant amid security concerns
1 minute read
By Rhys Dipshan | April 16, 2018
Federal courts are split on whether computer fraud provisions in cyberinsurance policies cover the actions of employees tricked into sending funds to cybercriminals. The Ninth Circuit is among the courts that have ruled that computer fraud policies don't cover those situations.
1 minute read
By Rhys Dipshan | April 16, 2018
Federal courts are split on whether computer fraud provisions in cyberinsurance policies cover the actions of employees tricked into sending funds to cybercriminals.
1 minute read
By NJLJ Contributors | April 16, 2018
The latest insights in hi-tech litigation: covering crypto-currencies, cyberattacks, technology assisted review, spoliation of electronic evidence and more.
1 minute read
By Jared Coseglia, TRU Staffing Partners | April 16, 2018
Known for its CISA and CISM audit certifications, ISACA pivots toward practical hands-on security training with CSXP.
1 minute read
By Avi Benayoun and Chelsea Koff | April 13, 2018
Preserve, preserve, preserve … but what about protect?
1 minute read
By Ian Lopez | April 13, 2018
While China has been largely compliant with an agreement with the U.S. to not hack for intellectual property, new data indicates M&A info and contracts are fair game.
1 minute read
By Gabrielle Orum Hernández | April 13, 2018
The legal services and technology company will launch its data products group to move alongside its other innovation teams.
1 minute read
By Ben Hancock | April 12, 2018
The regulator warned tech companies to make sure their software development environments are secure. Uber's 2016 breach came after an engineer stored an access key to a cloud database in code hosted on GitHub.
1 minute read
By Mark S. Sidoti and Joshua S. Levy | April 12, 2018
A look at where the Third Circuit stands on spoliation of electronic evidence
1 minute read
Presented by BigVoodoo
Join General Counsel and Senior Legal Leaders at the Premier Forum Designed For and by General Counsel from Fortune 1000 Companies
This conference brings together the industry's most influential & knowledgeable real estate executives from the net lease sector.
Join the industry's top owners, investors, developers, brokers & financiers at THE MULTIFAMILY EVENT OF THE YEAR!
Atlanta s John Marshall Law School is seeking to hire one or more full-time, visiting Legal WritingInstructors to teach Legal Research, Anal...
Lower Manhattan firm seeks a premises liability litigator (i.e., depositions, SJ motions, and/or trials) with at least 3-6 years of experien...
At NJM, a top-rated insurance company, we are seeking an Attorney on our Workers Compensation legal team with between 3 and 5 years of expe...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS