Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

How Bankruptcy Courts Will Treat Cases Involving Cryptocurrency Exchanges Image

How Bankruptcy Courts Will Treat Cases Involving Cryptocurrency Exchanges

Richard J. Mason

This article looks at some of the issues that may arise if a cryptocurrency exchange becomes a debtor in a case under the Bankruptcy Code.

Features

Cloudy With a Chance of IoT attacks: The Cybersecurity Forecast for 2019 Image

Cloudy With a Chance of IoT attacks: The Cybersecurity Forecast for 2019

Leigh-Anne Galloway

2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.

Features

What the U.S.' Pursuit of Foreign Nation-State Hackers Means for Cybercrime Victims and Targets Image

What the U.S.' Pursuit of Foreign Nation-State Hackers Means for Cybercrime Victims and Targets

Ronald Cheng & Mallory Jensen

For years, the U.S. has maintained an active enforcement campaign against overseas cyber criminals and while these past efforts have not been haphazard, they have not necessarily been part of a specific drive to address the serious issue of foreign cybercrime committed by nation states. Recent announcements by the DOJ show that this enforcement campaign is accelerating and expanding.

Features

Q&A with Women Leaders in Cybersecurity and Privacy Image

Q&A with Women Leaders in Cybersecurity and Privacy

Adam Schlagman

In 2017, Atlanta attorney Bess Hinson founded the Atlanta Women in Cybersecurity Roundtable, an invitation-only initiative to provide community and resources to advance women in cybersecurity in Atlanta. Here, we speak with some of those women leaders about their biggest security and privacy challenges and why women are pursing legal and other roles in the cybersecurity and privacy field.

Features

Are Cybersecurity Solutions and Consulting a New Revenue Stream for Law Firms? Image

Are Cybersecurity Solutions and Consulting a New Revenue Stream for Law Firms?

Ishan Girdhar

The Big 4 accounting firms have identified legal services as an area for growth beyond traditional financial services and consulting services.

Features

Detecting, Discovering, and Eliminating Threats Image

Detecting, Discovering, and Eliminating Threats

Tyler Young

Defending your corporation from advanced cyber threats is a difficult and never-ending challenge. The attack surface of an organization is constantly adapting to meet the needs of a business and attack vectors are increasing nearly every few hours.

Features

Fighting Biometric Fraud on the Blockchain Image

Fighting Biometric Fraud on the Blockchain

Alastair Johnson

The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.

Features

Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits Image

Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits

Stephen Moore

Being prepared for the worst before it even happens can minimize the damage in the event of a cybersecurity incident. To get any company ready for a cybersecurity event, the first step is to organize a team to write a mock breach notification letter that will represent your message to the world about your failure in the event you have a breach.

Features

Making Sense of YouTube's Monetization Policies Image

Making Sense of YouTube's Monetization Policies

Gwendolyn Seale

This article delves into YouTube's policies for channel monetization, explores the different streams of revenue an artist or creator may be entitled to receive for their works, and offer suggestions to indie creators and more established creators, so they can meet these new thresholds.

Features

Legal Tech: Moving to the Cloud for Business Continuity Planning Image

Legal Tech: Moving to the Cloud for Business Continuity Planning

Jonathan Reed

In the past year, the devastation caused by natural disasters has been immense. Law firms, like every other business, are left to deal with the aftermath of these catastrophic events. Firms that have established business continuity plans to put into effect when these instances occur will find themselves a step ahead in the disaster recovery process. And the ones leveraging cloud technology are at an even greater advantage.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES