Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Law Firms' Pressing AI Questions Image

Law Firms' Pressing AI Questions

Cassandre Coyer

Most of the legal industry has by now boarded the generative artificial intelligence train, filling up conference sessions dedicated to the topic, testing new legal technology solutions and exploring the emerging legal questions that the technology will pose. But most of their questions about generative AI are still unanswered.

Features

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements Image

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements

Alan Friel, David Manek, Sasha Kiosse, David Farber & Colleen M. Yushchak

The assessment and audit requirements of the new generation of state data protection laws will force U.S. companies to move beyond mere window dressing and instead require them to develop fulsome data protection programs.

Features

Artificial Intelligence Redefines Our Defense Against Cyber Threats Image

Artificial Intelligence Redefines Our Defense Against Cyber Threats

Roy Hadley

The cybersecurity landscape is on the brink of a transformative shift, with predictive analytics and behavioral analysis leading the charge for more resilient and adaptive defenses.

Features

Deep Fake of CFO on Videocall Used to Defraud Company of $25M Image

Deep Fake of CFO on Videocall Used to Defraud Company of $25M

Scott Warren

Hackers are using AI to sift large digital data to identify more convincing approaches for their scams as well as weaknesses in weaknesses in software coding or network security.

Features

5 Expert Cybersecurity Steps to Take in 2024 Image

5 Expert Cybersecurity Steps to Take in 2024

Luke Tenery

As many CISOs and cyber teams think about the year ahead, and legal professionals consider the far-reaching consequences of cybersecurity, here is a checklist to help them prepare for the biggest cybersecurity trends to come.

Features

Pennsylvania Court Hit With Cyberattack, But It Had a Plan Image

Pennsylvania Court Hit With Cyberattack, But It Had a Plan

Daniel J. Siegel

Law firms have information that hackers want — Social Security numbers, financial data, personally identifiable information and more. It is therefore essential that firms plan for a possible breach. And when the breach occurs, have a plan.

Features

FTC's 'Click to Cancel' Rule Could Cost $2.7 Billion for Businesses Image

FTC's 'Click to Cancel' Rule Could Cost $2.7 Billion for Businesses

Maydeen Merino

The FTC's proposed click to cancel rule amendments would impose a one-time cost of $2.7 billion on businesses and have an annual effect on the national economy of at least $100 million, according to an economic report by the online advertising industry's association.

Features

All the News That's Fit to Pinch: 'NYT v. OpenAI' Image

All the News That's Fit to Pinch: 'NYT v. OpenAI'

Jonathan Moskin & Rachel Pauley

The emerging cases by authors and copyright owners challenging various generative AI programs for using copyrighted materials are certain to create new troubles for the courts being asked to apply the fair use doctrine to this important new technology.

Features

To Benefit from Cyber Insurance Coverage in France, Don't Forget to File a Complaint Image

To Benefit from Cyber Insurance Coverage in France, Don't Forget to File a Complaint

Stéphanie Faber & Charles Helleputte

Since April 2023, French regulation makes the payment of insurance compensation in case of cyberattacks conditional on the filing of a complaint within a reduced time frame. This regulation has been enacted in the context of the French government decision to fight against the resurgence of cyberattacks, together with ransom demands, which have a significant impact on the economy.

Features

Artificial Intelligence: A New Weapon of Insider Threats Image

Artificial Intelligence: A New Weapon of Insider Threats

Peter Collins

In the hands of a motivated insider with only average technical proficiency, AI becomes a uniquely effective tool with which to penetrate an organization's complete security infrastructure for any number of malicious purposes.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Impact of Disney's Motion to Compel Arbitration In Scarlett Johansson's Lawsuit Over 'Day-and-Date' Release of 'Black Widow'
    Johansson alleges that, in order to generate new subscribers for Disney+, Disney intentionally interfered with her talent agreement with Disney affiliate Marvel Studios for her featured role in Black Widow — and thus allegedly induced Marvel to breach a promise in the Johansson/Marvel agreement for the film to be initially distributed in exclusive "wide theatrical release." Updated Oct. 1 to reflect a confidential settlement reached in the case.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›