Features

The Blockchain Will Support GDPR, but Not How Most People Think
It's clear that the onset of GDPR regulations and a quickly changing consumer sentiment about the sensitivity and value of their personal data will reorient a company's interactions with their customers and their information. There will be some pain points in this transition, as Facebook investors recently demonstrated, but it doesn't have to be a unilateral downturn for the tech industry.
Features

Online Extra: Severity of Data Breaches Increases In First Half of 2018
Gemalto's 2018 Breach Level Index found 4.5 billion records were stolen, lost or compromised worldwide in the first half of 2018, a 133 increase over the first half of 2017.
Features

Cybersecurity for Government: Lessons from the Front Line
During the time it takes you to read this article, somewhere in the United States, a governmental entity will probably be the victim of a cyber-attack. This article highlights the areas that are most impactful, based on experience in dealing with both large and small cyber-attacks against governments and governmental entities.
Features

Update on UK Sanctions, Anti-Money Laundering and Brexit
This article provides a brief education about where things currently stand in the UK as regards to sanctions and anti-money laundering in the shifting sands of the Brexit process.
Features

Cybersecurity and Email
In the legal community, professionals have embraced email. However, as increasing concerns and regulations around data security continue to evolve, the future of digital communication via email may not meet the more stringent requirements.
Features

Fighting Biometric Fraud on the Blockchain
The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
Features

Law Firms: You Can't Buy Yourself Out of Risk
A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).
Features

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up
How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don't follow security protocols or are tricked into downloading malicious code.
Features

Retail Leads the Way in Data Breaches — Here's How to Protect Your Customers
If 2017 was considered the “year of the data breach” as the number of incidents hit a new record high of 1,579, 2018 might get even more serious. Just a little more than halfway through 2018, the number and scale of data breaches that have already been reported is staggering.
Features

Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions
Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›
- An Overview of Recovering Trademark Infringement DamagesThis article discusses recovering damages for trademark infringement and various strategies for establishing those damages.Read More ›
- Removing Restrictive CovenantsIn Rockwell v. Despart, the Third Department recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Unlicensed Real Estate Broker in New York: BewareThe U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.Read More ›