Data Privacy & Cybersecurity
About one in five security breaches are engineered by contractors or once-trusted employees. Typically these breaches are more costly and […]
NSA leaker Edward Snowden used a low-tech method for accessing secure information he shouldn’t have been able to see: He […]
Traditional corporate insurance, including standard CGL policies, are increasingly unlikely to cover cyber risks. Securing cyber insurance is key for […]
While cyber-security threats posed by foreign governments and terrorist groups garner headlines, a large proportion of data breaches are carried […]
Companies and organizations are spending more money and time, more frequently, to resolve cyber-attacks, according to a study from HP […]
New privacy legislation has been signed into law by Governor Jerry Brown in California, which traditionally sets the bar in […]
A lawsuit was dismissed, but legislation is on the table.
Reducing information flow may prevent new companies from gaining the kind of valuable information others already possess.
An update on the the cyber-jungle of APTs, botnets, Trojans, rootkits and “polymorphic code.”
It’s likely to influence the direction of privacy laws and thus business models worldwide.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.