Data Privacy & Cybersecurity

Contracting for Quantum-as-a-Service For Legal Organizations

Contracting for Quantum-as-a-Service For Legal Organizations

Read how computing advances are shaping Quantum-as-a-Service agreement negotiations as companies confront new risks, pricing models, and compliance obligations.

Unknown Attackers Breach Cybersecurity Company F5's Networks, Steal Customer Data

Unknown Attackers Breach Cybersecurity Company F5’s Networks, Steal Customer Data

Discover how hackers infiltrated cybersecurity company F5 Networks, stealing source code and customer data in a sophisticated, government-backed breach.

Ransomware Attacks Using Legitimate Commands To Steal Data

Ransomware Attacks Using Legitimate Commands To Steal Data

Discover how attackers exploit exposed databases using legitimate commands to steal, delete, and ransom data using ransomware that evades detection.

Hackers Hammer Texas Electric Cooperatives in Alleged Ransomware Breach

Hackers Hammer Texas Electric Cooperatives in Alleged Ransomware Breach

Learn about how hackers allegedly breached Texas electric cooperatives, exposing sensitive data and raising cybersecurity concerns for critical infrastructure.

Managing Cloud Dependence: What the Amazon Web Services (AWS) Outage Reveals About Risk Exposure

Managing Cloud Dependence: What the Amazon Web Services (AWS) Outage Reveals About Risk Exposure

The Amazon Web Services (AWS) outage underscores critical cloud concentration risks and the fragility of digital infrastructure dependencies.

New Ransomware Risks for Remote Access Tools

New Ransomware Risks for Remote Access Tools

 Learn why many company networks are vulnerable to ransomware installed through common remote access tools used by employees.

Three Strategic Pillars for Building Cyber Resilience in Electric and Utilities

Three Strategic Pillars for Building Cyber Resilience in Electric and Utilities

Discover why cyber resilience in electric and utilities (E&U) demands continuous focus on backup technology, business continuity, and incident response.

Study Exposes Hidden Ownership, Security Flaws, and VPN Risks

Study Exposes Hidden Ownership, Security Flaws, and VPN Risks

Read about new research uncovering major VPN risks, including hidden Chinese control and security flaws that endanger users seeking online privacy.

FTC Sues Live Nation and Ticketmaster, Alleges BOTS Act Violations

FTC Sues Live Nation and Ticketmaster, Alleges BOTS Act Violations

 Learn why the FTC and seven states accuse Live Nation and Ticketmaster of violating the BOTS Act (Better Online Ticket Sales) in a landmark lawsuit against the ticketing industry.

FTC Targets Sendit For COPPA Violations and Misleading Billing Practices

FTC Targets Sendit For COPPA Violations and Misleading Billing Practices

Discover how the FTC’s lawsuit alleging COPPA violations against Sendit could impact the enforcement of child data privacy and deceptive subscription practices in the social media sector.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top