By Dan Packel | February 21, 2019
It makes sense that hackers recently went after an unnamed firm known for its IP work, alongside other targets—law firms hold sensitive information for not just one client, but many.
By Dan Packel | February 20, 2019
Hackers recently went after an unnamed law firm known for its IP work.
By Dan Packel | February 20, 2019
It makes sense that hackers recently went after an unnamed firm known for its IP work, alongside other targets—law firms hold sensitive information for not just one client, but many.
By Dan Packel | February 20, 2019
Hackers reportedly went after an unnamed firm known for its IP work—a stark reminder law firms hold sensitive information for not just one client, but many.
New York Law Journal | Analysis
By Ted Augustinos, Andy Gandhi and Adriel Ginsburg | February 20, 2019
With a holistic approach to security and compliance incorporating the unique challenges of IoT, companies can develop and deploy IoT technologies in a way that delivers on the promise of IoT, while mitigating potential cyber risks and exposures.
Legaltech News | Analysis|News
By Frank Ready | February 20, 2019
The European Union's General Data Protection Regulation is one of the leading uses of contract AI inside corporate legal departments and a new survey indicates that the technology could see dramatic growth within the legal sector by the end of 2019.
By Chuck Davis, Adaptive Solutions | February 20, 2019
Regardless of size, what are the best practices a firm should follow? An outline the layers of security comprising the baseline plan for legal technology.
Daily Report Online | Commentary
By Kamal Ghali and Mark Ray | February 20, 2019
Much like your company's IT team uses command-and-control software to fix your computer remotely, a botnet can give a single actor the power to control an army of infected computers. But the Joanap botnet comes with a unique twist.
By Kamal Ghali, Bondurant, Mixson & Elmore; and Mark Ray, Nardello & Co. | February 20, 2019
Much like your company's IT team uses command-and-control software to fix your computer remotely, a botnet can give a single actor the power to control an army of infected computers. But the Joanap botnet comes with a unique twist.
By Victoria Hudgins | February 19, 2019
Respondents said risk and compliance automation tools are the most effective at securing their organization from cyber threats. However, many said breach response and forensics tools could offer additional cybersecurity effectiveness in the coming years.
Presented by BigVoodoo
Join the industry's top owners, investors, developers, brokers & financiers at THE MULTIFAMILY EVENT OF THE YEAR!
Law.com celebrates the California law firms and legal departments driving the state's dynamic legal landscape.
The Texas Lawyer honors attorneys and judges who have made a remarkable difference in the legal profession in Texas.
Nestled in the heart of Northern California Wine Country, Sonoma County is the largest county in the North Bay region of the San Francisco B...
Fogarty & Hara, Esqs, a well-established Bergen County law firm representing school districts and private schools, seeks an associate at...
Shift Schedule: Monday-Friday, 9AM-5PMHours Per Week: 35General Responsibilities:Under the supervision of the Director of Legal Services or ...