Don’t forget you can visit MyAlerts to manage your alerts at any time.
Coverage across state and federal laws and international cybersecurity regulations as well as the measures and technologies used to comply with them. Also cover breaches impacting law firms and find the legal angle for those covering corporations. Litigation ensuing from breaches is covered as well.
By Stephen Treglia | October 30, 2017
In his Cross-Border Concerns column, Stephen Treglia analyzes the question: How is it possible that a computer system can be so well locked-down that no hacker can successfully gain access, and yet the entity in charge of protecting that data be considered out-of-compliance?
1 minute read
By David Sankar, Wolters Kluwer's ELM Solutions | October 30, 2017
Knowing where to begin addressing cybersecurity can be overwhelming, but can be made less so by starting with a few simple steps.
1 minute read
By Paul Rosen and Carlton Greene | October 30, 2017
It's Friday afternoon before the New Year's holiday. A Fortune 500 CEO gets a call from her company's general counsel: “We've been hit by ransomware. We are locked out of our network and can't communicate with our customers. The hackers demanded $30,000 in Bitcoin in the next 24 hours.”
1 minute read
By Mike Cunning and Douglas B. Bloom | October 27, 2017
Mike Cunning and Douglas B. Bloom write: Given the number and significance of publicly disclosed cybersecurity events, acquisitive companies simply cannot ignore the risk that a target's cybersecurity exposure presents to the value of a deal.
1 minute read
By Anthony J. Ferrante | October 27, 2017
Anthony J. Ferrante writes: We have learned that our ability to protect our networks requires a complete understanding of the vulnerability ecosystem.
1 minute read
By Rhys Dipshan | October 27, 2017
While many wait to see the effects of future cyberthreats, and of regulations like the GDPR, the adoption of cyberinsurance remained stunted in the EMEA region in 2016
1 minute read
By Shari Klevens and Alanna Clair | October 27, 2017
Law firms have become prime targets for many types of cyberattacks, including phishing scams, technological spying and hacking. It is no…
1 minute read
By Benjamin Dynkin, Barry Dynkin, and E.J. Hilbert | October 27, 2017
What can companies do about integrity attacks? The answer is both simple and complex.
1 minute read
By Ed Silverstein | October 27, 2017
The information provided by Microsoft was too general and did not describe the data processed and purposes for which it was processed in sufficient detail.
1 minute read
By Leonard Deutchman | October 26, 2017
A recent opinion demonstrates how, when deciding e-discovery matters, common sense may be far more important than a mastery of esoteric knowledge regarding computers.
1 minute read
Presented by BigVoodoo
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
Consulting Magazine recognizes leaders in technology across three categories Leadership, Client Service and Innovation.
Celebrate outstanding achievement in law firms, chambers, in-house legal departments and alternative business structures.
Truly exceptional Bergen County New Jersey Law Firm is growing and seeks strong plaintiff's personal injury Attorney with 5-7 years plaintif...
Epstein Becker & Green is seeking an associate to joins its Commercial Litigation practice in our Columbus or Cincinnati offices. Ca...
Job Opportunity: Location: Prestigious Florida Law Firm seeks to hire a Business attorney with at least 5 years of experience for their Ft. ...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS