By David Greetham and David Levine, Ricoh USA, Cybersecurity Law & Strategy | August 14, 2017
Whether, when and how to encrypt requires a careful look at what data the firm keeps, and how much protection it needs.
By Christine Simmons | August 12, 2017
Here's a hypothetical but very possible scenario for a law firm: A hacker emails a law firm leader, saying he has obtained confidential and sensitive client information from the firm and will make it public unless the hacker is paid millions, in an apparent ransomware attack.
By Christine Simmons | August 10, 2017
At an ABA discussion on law firm cybersecurity threats, one panelist said his security company tricked 85 percent of an organization's employees to click on a fake phishing email about bonuses. Another had a simple cybersecurity lesson for lawyers: Don't forget your laptop on the plane.
By Amy L. Carlson and Jon Washburn | August 10, 2017
Cyberattacks will continue to become harder to defend against, and will require more information security due diligence to protect company assets than ever before—you will only be as good as your weakest link.
By B. Colby Hamilton | August 9, 2017
The settlement came after the states claimed Nationwide and a subsidiary failed to apply a critical security patch to its network that could have protected it from the cyberattack.
By Ed Silverstein | August 9, 2017
As hacking attempts against law firms continue to rise, attorneys can't forget their ethical obligations if the worst occurs.
By Cogan Schneier | August 8, 2017
According to the local rules of the D.C. court, Chief Judge Beryl Howell will oversee any disputes arising from Mueller's probe.
By DAVID F. KATZ, RICHARD D. SMITH, ELIZABETH K. HINSON, JASON MARK ANDERMAN AND SARAH STATZ | August 7, 2017
Understanding third-party service provider relationships and the security risks they present to any organization is an essential element of cybersecurity planning. Bad actors continue to exploit the risks presented by third-party service providers that maintain access to corporate-owned information systems. Over the last several years, companies have found themselves the victim of costly and high profile data breaches occurring as a result of a third-party service provider's security failures. See, e.g., In re Target Corp. Data Sec. Breach Litig., 66 F. Supp. 3d 1154 (D. Minn. 2014); In re: The Home Depot, Inc., Customer Data Sec. Breach Litig., No. 1:14-MD-2583-TWT, 2016 WL 2897520, at 1 (N.D. Ga. May 18, 2016).
By Michael Booth | August 7, 2017
New Jersey Gov. Chris Christie on Monday signed legislation permitting victims and witnesses of alleged domestic violence or sexual assault to testify against defendants through closed-circuit television—a possibility that until now existed only for minors.
By Rhys Dipshan | August 7, 2017
Comments by a U.S. assistant attorney sparked a debate on how Europe's evolving encryption stance will impact the U.S., and whether the security debate has already shifted.
Presented by BigVoodoo
This conference aims to help insurers and litigators better manage complex claims and litigation.
Recognizing innovation in the legal technology sector for working on precedent-setting, game-changing projects and initiatives.
Legalweek New York explores Business and Regulatory Trends, Technology and Talent drivers impacting law firms.
McCarter & English is actively seeking a 5th-6th year trademark associate who has trademark prosecution, licensing and litigation experi...
**PLEASE READ THE COMPLETE AD BEFORE APPLYING***Established 25-year boutique Plaintiff's Personal Injury Law Firm in the Dadeland area seeki...
Our client, a multi-state full-service boutique, is seeking to add a senior construction litigation associate to their Florida team. Qualif...