Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Law & Strategy

Features

When Efficiency Meets the Duty to Verify: Reflections on The Verification-Value Paradox Image

When Efficiency Meets the Duty to Verify: Reflections on The Verification-Value Paradox

Leigh Vickery

The Verification-Value Paradox states that increases in efficiency from AI use “will be met by a correspondingly greater imperative to manually verify” the outputs. The result is that the net value of AI in many legal contexts may be negligible once verification is honestly accounted for. For low-stakes tasks, verification costs are light. For core legal work, verification costs are heavy. That’s the tension.

Features

Looking Back and Looking Ahead: Insights from 2025 In Legal Tech and What to Expect In 2026 Image

Looking Back and Looking Ahead: Insights from 2025 In Legal Tech and What to Expect In 2026

Cybersecurity Law & Strategy Staff

An annual tradition continues at Cybersecurity Law & Strategy as we poll our panel of experts on the key developments of 2025 and what we can expect in 2026 in AI, privacy, e-discovery and other areas of legal tech.

Features

What the 2025 NetDiligence Cyber Claims Study Reveals About Today’s Cyber Risk Landscape Image

What the 2025 NetDiligence Cyber Claims Study Reveals About Today’s Cyber Risk Landscape

Matthew White & Alexander F. Koskey

The latest data underscores that no sector or business is immune, and the financial, operational, and reputational stakes have never been higher. Against this backdrop, the 2025 NetDiligence Cyber Claims Study offers invaluable insights into the most pressing risks and trends shaping today’s cyber landscape.

Features

The Threat Actor Playbook Has Shifted from Files to Rows Image

The Threat Actor Playbook Has Shifted from Files to Rows

Megan Silverman

Given how the threat landscape is evolving, structured data expertise is no longer a niche specialty

Features

Hit With a Cyberattack? What You Do In the First 72 Hours Could Save Your Business Image

Hit With a Cyberattack? What You Do In the First 72 Hours Could Save Your Business

Matthew Toldero

When a cyberattack occurs, time is the most valuable asset. Much like law enforcement’s “first 48” hours rule in criminal investigations, the first 72 hours of a cyberattack, often referred to collectively as the “golden hour,” are crucial. Early action preserves critical evidence, prevents further harm, and increases the chance of a successful resolution.

Features

Disney-OpenAI’s Sora Deal: What it Signals for Licensing and Responsible AI Image

Disney-OpenAI’s Sora Deal: What it Signals for Licensing and Responsible AI

Reber “Mitch” Boult & Joshua Rojas

The Walt Disney Co.’s newly announced, three-year licensing agreement with OpenAI to bring more than 200 characters from Disney, Marvel, Pixar and Star Wars to Sora marks a pivotal moment at the intersection of intellectual property and generative AI. For rights holders, platforms, and brands, the deal illustrates an emerging blueprint for commercializing iconic IP in AI-native formats while attempting to manage legal, regulatory, and reputational risk.

Features

When Courts Push Back: The New e-Discovery Proportionality Standard for Mobile Data Image

When Courts Push Back: The New e-Discovery Proportionality Standard for Mobile Data

Michael D’Angelo

Mobile discovery has reached an inflection point. Courts spent 2024 handing out sanctions for two opposite failures: failing to preserve mobile data and collecting far too much of it. Litigants now face a genuine discovery double bind, including being punished for being careless and being punished again for being overly aggressive. That push-pull (collect more vs. collect less) is shaping the 2025 e-discovery landscape more than any technical development or new tool.

Features

New Texas AI Act Takes Effect Image

New Texas AI Act Takes Effect

Laura Lorek

The Texas Responsible Artificial Intelligence Governance Act (TRAIGA) takes effect Jan. 1, 2026 andlimits the use of AI for social scoring and activities that legislators say violate constitutional rights. It also sets up a regulatory sandbox for testing and create an Artificial Intelligence Council to provide guidance.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Supreme Court Asked to Assess Per Se Rule Tension in Criminal Antitrust
    In recent years, practitioners have observed a tension between criminal enforcement of the broadly written terms of the Sherman Antitrust Act of 1890 and the modern Supreme Court's notions of statutory interpretation and due process in the criminal law context. A certiorari petition filed in late August in Sanchez et al. v. United States, asks the Supreme Court to address this tension, as embodied in the judge-made per se rule.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›