By Ben Hancock | June 30, 2017
A Wisconsin federal magistrate judge has become the latest to rule that forcing Google to hand over email data stored overseas doesn't amount to an extraterritorial application of the law.
By Charles Toutant | June 30, 2017
Two recent New Jersey decisions have asserted jurisdiction over accused hackers who have no connection to the state, but allegedly sought to inflict harm on Garden State residents.
By Charles Toutant | June 29, 2017
In two unrelated decisions issued Wednesday, New Jersey courts have asserted jurisdiction over accused hackers who have no connection to the state, but allegedly sought to inflict harm on Garden State residents.
By Ian Lopez | June 29, 2017
A survey of 200 U.S. firms found that many law firms are unprepared for cyberattacks, and it's hurting their standing with clients.
By RHYS DIPSHAN | June 28, 2017
A four-step guide to how law firms can limit their exposure to further cyber theft and legal liabilities after an attack.For legal professionals, the latest widespread ransomware attack hits close to home. DLA Piper offices across Europe and the United States were crippled by ransomware in what was the first publicly acknowledged law firm victim of the attack. It is too early to tell if DLA Piper is the only firm to be affected, but its breach speaks to a broader vulnerability law firms across the globe face against increasingly sophisticated cyber threats.
By Cogan Schneier | June 28, 2017
Hackers may have used NSA tools to execute this week's global cyberattack, but lawyers say it would be nearly impossible for the victims, which include law firms, to sue the agency.
By RHYS DIPSHAN | June 28, 2017
A four-step guide to how law firms can limit their exposure to further cyber theft and legal liabilities after an attack.
By C. Ryan Barber | June 28, 2017
While their life-saving potential is clear, connected cars raise significant cybersecurity concerns. Jeff Massimilla addressed those concerns at an FTC and NHTSA conference.
By Rhys Dipshan | June 28, 2017
A four-step guide to how law firms can limit their exposure to further cyber theft and legal liabilities after an attack.
By Jeff Ton, Bluelock | June 28, 2017
Ensure your firm's disaster recovery needs are met by thinking about these service-level agreement stipulations ahead of time.
Presented by BigVoodoo
The African Legal Awards recognise exceptional achievement within Africa s legal community during a period of rapid change.
Consulting Magazine identifies the best firms to work for in the consulting profession.
Join General Counsel and Senior Legal Leaders at the Premier Forum Designed For and by General Counsel from Fortune 1000 Companies
The New Jersey Law Revision Commission, an independent legislative commission (N.J.S. 1:12A-1 et seq.), seeks a NJ-licensed atty in good sta...
The Federal Election Commission (FEC) is looking for a passionate and dedicated individual with extensive litigation experience as well as o...
We are seeking an attorney with a minimum of four years of experience in transactional work to join our well-established, nationally renowne...