Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

Four Keys to Litigation Technology Innovation in the Next Five Years
November 02, 2015
Electronic discovery is a complex business that requires continuous professional learning from litigation team members and ongoing innovation from technology solution providers. To help stimulate discussion and drive innovation, The Legal Innovation 2020 Working Group was formed at the beginning of 2015 in order to help legal-industry leaders identify the keys to success over the next five years.
The Art of Cyberwarfare
November 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
<b><i>Online Extra:</b></i> NJ Legislature Moves on Cybersecurity Bill
October 06, 2015
The New Jersey Legislature on Oct. 5 began taking steps toward increasing its ability to combat cybercrime.
Keeping the Data-Breach Headlines In Perspective
October 02, 2015
From the Sony Pictures settlement, to the Ashley Madison debacle, data breaches are making big headlines of late. And when it comes to one case in particular ' the data breach at luxury retailer Neiman Marcus ' some would-be experts are spinning a misleading, black-and-white storyline.
<b><i>Online Extra:</b></i> DOJ Wants Massive Government Data Breach Suits Consolidated
October 01, 2015
It was the worst data breach in the history of the U.S. government, and now the Justice Department says the ensuing lawsuits filed in six different jurisdictions belong in a single court in Washington, DC.
Senate Cybersecurity Bill Vote Stalled Again
September 02, 2015
Following months of debate, the U.S. Senate has delayed voting on the Cybersecurity Information Sharing Act, S. 754 (CISA), ahead of its summer recess. As part of an agreement reached on Aug. 5, the Act will be back on the Hill this month and will carry a number of new amendments when it resurfaces.
Ashley Madison Data Breach Sparks Suits
September 02, 2015
Infidelity website AshleyMadison.com and its parent company Avid Life Media Inc. have been hit with a pair of class actions in Los Angeles federal court stemming from the site's recent data breach.
Cybersecurity Data Sharing Now Available To Law Firms
September 02, 2015
Law firms now have access to a platform that allows them to share data on cybersecurity threats anonymously.
Recent Challenges To the FTC's Data Regulation Authority
September 02, 2015
Early on in 2015, pundits were already predicting that the extent and number of data breaches from 2014 would severely pale in comparison to those that would occur in 2015. Inevitably, people across the country, victims, media, members of government, and even litigious-minded attorneys, are scrambling to determine what legal recourse exists to not only retroactively seek retribution, but also proactively enforce data security methods ' a task that is still at its nascent stages of development.
<b><i>Online Extra:</b></i> Am Law 200 Firms Spending $7M on Cybersecurity Annually
August 31, 2015
With unfettered access to critical documents and information, law firms are an attractive target for hackers. Even when firms employ cutting-edge data security techniques, their possession of corporate data still multiplies the surface area of risk for that information. A recent survey of the Am Law 200, which tapped nearly one-third of firm CIOs for their experience, is showing the extent to which the highest grossing firms are spending to mitigate the risk associated with data security.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›