By Veeral Gosalia, FTI Consulting | December 6, 2021
Corporations across the globe were already reporting increases in suspicious activity, data leakage, IP theft and other data risks stemming from departing employees and remote workers. Now, existing data and risk implications are likely to be compounded.
By Michael Kemps, Innovative Computing Systems | December 1, 2021
Vulnerability makes us dependent on others, and as the start of this decade has shown, we are all vulnerable to varying degrees. The best way to protect those inherent parts of systems and processes exposed to manipulation and misdirection is cooperation in building resilient systems.
By David Kalat, BRG | November 30, 2021
What if a 'Really Nasty Virus' isn't a virus at all? This month's look at the history of cybersecurity examines early virus hoaxes—and how they interacted with real threats.
By Emil Sayegh, Ntirety | November 24, 2021
For all of that is created and consumed during October's Cybersecurity Month, it is disappointing to see how each year after all the thoughts have been shared, major security incidents continue to emerge. We need to begin to take stock of all the advice given during this month and put it to immediate practice.
By Mike Paul, Innovative Computing Systems | November 19, 2021
This article looks at each stage of a cyberattack, by way of a fictitious attack that took over a real estate agent's email account.
By Victoria Hudgins | November 17, 2021
Cybersecurity questions or audits are still relatively rare for solo practitioners and small law firms. But cybersecurity consultants say those days are numbered as general awareness of cyber threats spreads and insurance standards intensify.
By Victoria Hudgins | November 9, 2021
For many firms, pinpointing cybersecurity costs to a specific client can be challenging, while ethical obligations may prevent them from including cybersecurity line items in a client invoice.
By David Kalat, BRG | November 2, 2021
Before the 1990s, agents staffed the border only for limited business hours, and people frequently would find themselves trapped in the wrong country overnight—until a clever use of biometric technology saved the day.
By Kenya Parrish-Dixon, Empire Technologies Risk Management Group | October 20, 2021
The U.S. doesn't have a federal cybersecurity law, but that doesn't mean there is no cybersecurity industry standard. The combination of older regulations and guidance with new state statutes and federal guidelines provide a basket weave of compliance.
By Victoria Hudgins | October 19, 2021
Even after high-profile law firm data breaches, limited resources and the assumption that hackers wouldn't possibly target them is still a persuasive belief among some firms, observers say.
Presented by BigVoodoo
Join the industry's top owners, investors, developers, brokers & financiers at THE MULTIFAMILY EVENT OF THE YEAR!
Law.com celebrates the California law firms and legal departments driving the state's dynamic legal landscape.
The Texas Lawyer honors attorneys and judges who have made a remarkable difference in the legal profession in Texas.
When you come to work for New Jersey Judiciary you will join an 8500-member strong TEAM that operates with the highest standards of independ...
When you come to work for New Jersey Judiciary you will join an 8500-member strong team that operates with the highest standards of independ...
CAREER OPPORTUNITYUNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT VACANCY ANNOUNCEMENT - USDC-CT 24-14 POSITION: Pro Se Law Clerk OPENI...