Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed Image

Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed

Stephanie Forshee & Jennifer Williams-Alvarez

<b><i>The Company Failed to Notify 57 Million Users of a Breach In October 2016. Two Employees Tasked with Handling the Response Process Have Left the Company, Including Uber In-House Attorney Craig Clark, Who Reported to the Company's Chief Security Officer.</b></i><p>Uber Technologies Inc. failed to notify 57 million users that their data was exposed in a breach, according to a company blog post published on November 21, which was confirmed by a source close to the matter.

Features

<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions Image

<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions

Mike Hamilton

In today's political climate, it has almost become "normal" that people frivolously make speculative statements without any proof that the statement is true. While this may be standard practice in the political world, in court this practice will not be convincing to any judge, especially when making an argument for e-discovery sanctions based on new rule FRCP 37(e).

Features

Ransomware: What to Do When It Happens to You Image

Ransomware: What to Do When It Happens to You

Kiran Raj & Mallory Jensen

In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident.

Features

Security First Approach Provides a Significant Advantage to Law Firms Image

Security First Approach Provides a Significant Advantage to Law Firms

Mark Sangster

Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. Here's what you need to know.

Features

Podcast: Phishing Image

Podcast: Phishing

Jason Thomas

Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.

Features

What Lies Beneath the Surface: The Dark Web Image

What Lies Beneath the Surface: The Dark Web

Elizabeth Vandesteeg & Jeffrey Goldberg

This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.

Features

When Products Start Teaching Cybersecurity Process Image

When Products Start Teaching Cybersecurity Process

Jared Coseglia

<b><i>New Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large</b></i><p>Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.

Features

The Dark Web Image

The Dark Web

Elizabeth Vandesteeg & Jeffrey Goldberg

The goals of this article are: 1) to provide a basic outline of the structure of the Web and to provide some insight into the purpose for and content housed on each level; and 2) to give some practical tips on preventing your company's data from ending up on the Dark Web.

Features

<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles Image

<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles

Zach Warren

<b><i>The Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age</b></i><p>Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.

Features

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies Image

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies

Robert J. Anello & Christina Lee

As the adoption of cryptocurrencies spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations mean greater scrutiny than ever before.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES