Features
Fighting Biometric Fraud on the Blockchain
The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
Features
Law Firms: You Can't Buy Yourself Out of Risk
A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).
Features
Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up
How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don't follow security protocols or are tricked into downloading malicious code.
Features
Retail Leads the Way in Data Breaches — Here's How to Protect Your Customers
If 2017 was considered the “year of the data breach” as the number of incidents hit a new record high of 1,579, 2018 might get even more serious. Just a little more than halfway through 2018, the number and scale of data breaches that have already been reported is staggering.
Features
Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions
Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.
Features
Law Firms: You Can't Buy Yourself Out Of Risk
A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).
Features
Securing Each Link in the e-Discovery Chain
Cloud service providers to the federal government must meet the rigorous requirements of the Federal Risk and Authorization Management Program. FedRAMP, as it's known, is designed to help federal agencies follow the government's “cloud first” policy, and includes detailed and strict encryption and other cybersecurity requirements.
Features
Blockchain Will Bring Opportunities, Challenges to Legal Discovery
As more and more data is in blockchains, attorneys will have to interact with it. Blockchain will also become part of litigation without being the central focus as systems move to blockchain implementation. Attorneys will have to take note.
Features
Legal Tech: Early 2018 E-Discovery Case Law Review: Sanctions and the Reasonableness of TAR
Cases from early 2018 that stand above many others for the impact they will have on both sanctions and e-discovery review processes moving forward.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›