View the Digital Edition of this Special Report. 

Protecting Your Business Against Automated Intruders

Bots add value by facilitating the execution of online tasks at speeds and scales unreachable by human users. But the ubiquity of bots has a dark side, threatening both governmental and commercial institutions.

A Line in the Clouds: Whose Cybersecurity Goes Where?

The problem involved with assessing and addressing fair allocation of cybersecurity responsibilities, in a new kind of commercial relationship with interactive, interconnected and interdependent IT products and services, reflects the need for lawyers to evolve if they aspire to competently serve enterprise clients.

Striking a Balance Between Cybersecurity and Employee Privacy

Most successful approaches for striking the proper balance involve having clear policies.

Connecting the Dots on the Regulation of Connected Medical Devices

This article will discuss several critical lessons that manufacturers of connected medical devices can learn from recent unprecedented coordination among the FDA, the Department of Health and Human Services Office of Inspector General and the Department of Homeland Security, respectively, as well as the increasingly important role the Federal Trade Commission has come to occupy with respect to the cybersecurity of connected medical devices.

The Obligation to Secure Your Opponent's Data in the Age of Hacking

The question is not whether a receiving party has a duty to take reasonable steps to protect data, but what is reasonable and proportionate in the context of the matters.

How Much Will Be Enough? Third-Party Diligence Under the NYDFS Cybersecurity Requirements

Recent enforcement actions by other regulatory bodies in response to data breaches attributable to third parties may shed some light on what Covered Entities should do and what level of due diligence DFS may expect when it comes to third parties.