Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds
Cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year. These cutting-edge problems intersect in interesting ways with companies' existing fraud and anti-money laundering concerns, but it all starts with the cryptocurrency "wallet."
Features

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise
The U.S. and China are in the midst of an escalating trade war and the DOJ has been prosecuting trade misappropriation cases against China with notable vigor as of late.
Features

Elections: The Hidden Security Danger for Governments
The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. It is incumbent upon the state and local governments to ensure the security of all elections.
Features

Why Do Cybersecurity Programs Fail?
It seems this should be a key question for everyone in business, government, technology, and cybersecurity: If we know the problem with cybersecurity, and have ways of methods of addressing the problem, why are we still failing?
Features

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments
A survey of more than 460 attorneys and decision makers working in corporate legal departments nationwide found that in-house teams, already stretched by limited resources, are confronting new and traditional challenges. Cybersecurity ranked among legal departments' biggest concerns for 2018.
Features

Phishing for Whales with Spears
<b><i>What Your Organization Can Do to Protect Itself from Email-Based Attacks</b></i><p>There's no question that email has revolutionized the way we operate. Unfortunately, for all of its convenience, email has opened the door to serious security threats that include viruses, malware and fraud. Phishing scams have become a widespread problem — you'd be hard pressed to find anyone who hasn't been on the receiving end of a phishing attempt.
Features

Understanding the Intersection Between GDPR and Cybersecurity
It's been about half a year since Europe's General Data Protection Regulation (GDPR) was activated, and corporate legal, privacy and compliance teams are beginning to adjust to the new lay of the land. We've seen early examples of enforcement activity, and those are helping organizations better understand the long-term landscape for compliance.
Features

Unprepared for a Cyberattack? The DOJ Wants to Change That
<b><i>New U.S. Department of Justice Cybersecurity Guidelines Stress Preparedness Amid Reports That Many Organizations Have Failed to Plan for a Breach</b></i><p>Data protection tips are virtually everywhere these days. So it's hardly surprising that the U.S. Department of Justice has released new guidelines on that very topic. The UK's National Cyber Security Centre is poised to follow suit.
Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds
The advent of cryptocurrencies has raised a host of legal issues; some of the most immediate ones — such as whether cryptocurrencies are securities — appear to have been resolved, but cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year.
Features

Meritas' New Cybersecurity Standard Requirement Assures Legal Clients
Meritas, a nonprofit association of law firms, now requires its law firm members to follow a new cybersecurity standard. The reason for this new standard? Law firms' clients.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›
- An Overview of Recovering Trademark Infringement DamagesThis article discusses recovering damages for trademark infringement and various strategies for establishing those damages.Read More ›
- Removing Restrictive CovenantsIn Rockwell v. Despart, the Third Department recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Unlicensed Real Estate Broker in New York: BewareThe U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.Read More ›