Law.com Subscribers SAVE 30%

Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.

Search

We found 1,186 results for "Cybersecurity Law & Strategy"...

<b><i>Online Extra:</b></i> Cybersecurity Professionals Apprehensive on Government Access to Encrypted Data
March 31, 2016
A recent survey of security professionals takes these concerns to a new level, with 81% of respondents reporting they think it's 'very likely' or 'certain' that hackers can take advantage of the government's capability to access encypted data.
<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info
March 31, 2016
For several years law firms have been a key target for hackers seeking to obtain confidential information about initial public offerings, intellectual property and M&amp;A deals, claim cybersecurity consultants, but rarely does word about specific attacks become public.On March 29, Crain's Chicago Business reported that 48 top firms, most of which appear in the Am Law 100 rankings, were targeted recently by a Russian hacker living in Ukraine seeking to trade on M&amp;A information stolen from law firms.
Data Breach Liability
February 29, 2016
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands, it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.
Top Security Intrusion Trends the Legal Community Should Watch
February 29, 2016
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&amp;A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.
Top Security Intrusion Trends the Legal Community Should Watch
February 29, 2016
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters. Legal counsel, as trusted neutral advisors, are uniquely qualified to help navigate risk considerations and bridge customer deliverables and workforce expectations with adequate security and shifting legal requirements. As a result, it is important that lawyers understand the latest trends in cyber intrusions.
A 'Cloud Security Doctrine' for Law Firms
February 29, 2016
Cloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."
<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity
February 29, 2016
The Federal Deposit Insurance Corporation is the latest entity to release a framework for cybersecurity.
How Startups Can Protect Consumer Privacy and Enhance Cybersecurity
January 31, 2016
Many startup businesses collect and store vast amounts of personally identifiable information (PII) from consumers, but often fail to adequately protect the privacy of this consumer information. There could be many reasons for this, but it is likely the result of limited budgets and priorities.
Prioritizing e-Mail Security in the Legal Sector
January 31, 2016
Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.
Data Breach Liability
January 31, 2016
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands, it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›