Data Privacy & Cybersecurity
Read why the lead plaintiff in a class action over the Change Healthcare cyberattack alleged lax security and support failure.
Beware of Windows updates that trick operating systems into installing an older system version, a so-called downgrade attack.
Learn about SSH access vulnerabilities related to server-side deployments and implementations in wireless access points, routers, and firewalls.
Learn more about why CISOs felt under siege and targeted before the SEC SolarWinds charges were dismissed and what this means for the cybersecurity community.
Learn more about Abu v. Dickson, which highlights critical considerations about the boundaries of an IT administrator’s access in corporate disputes.
Learn more about Colorado’s AI law, which sets a precedent requiring businesses to prevent algorithmic discrimination and ensure transparency in AI systems.
Cyber insurance claims are on the rise. Discover how securing boundary devices and adopting robust strategies can help safeguard against escalating threats.
Malware-as-a-Service is enabling low-skilled attackers to launch complex cyber threats. Discover how these evolving tactics are reshaping the security landscape
Delve into a recent Microsoft Azure outage that caused two service interruptions, one caused by security implementation errors.
Explore expert insights into the latest security issues and cloud storage service vulnerabilities in Amazon Web Services and other providers.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.