Data Privacy & Cybersecurity

CrowdStrike Outage Highlights the Vulnerability of Digital Ecosystems

CrowdStrike Outage Highlights the Vulnerability of Digital Ecosystems

Explore how the use of AI in a company’s system amplifies the vulnerability of digital ecosystems and networks, as exemplified by the CrowdStrike incident.

Department of Energy Releases New Supply Chain Cybersecurity Principles

Department of Energy Releases New Supply Chain Cybersecurity Principles

Explore these supply chain cybersecurity best practices formulated by the Department of Energy to prevent disruption of critical infrastructure.

Class Actions Filed After Largest Breach Of Personally Identifiable Information

Class Actions Filed After Largest Breach Of Personally Identifiable Information

Learn more about the largest breach of personally identifiable information (PII) involving allegations that a data broker never notified those affected.

Provider Consolidation Is Driving Litigation In Healthcare Data Breach Lawsuits

Provider Consolidation Is Driving Litigation In Healthcare Data Breach Lawsuits

Read how provider consolidation ups the ante for healthcare data breach lawsuits and why settlement is the preferred option for resolution.

Zero Trust Cybersecurity Becoming Essential for Legal Departments

Zero Trust Cybersecurity Becoming Essential for Legal Departments

Discover how zero trust cybersecurity reshapes risk management for legal professionals, ensuring robust protection through continuous verification.

CISA and FBI Give Advisory on BlackSuit Ransomware Gang

 A new FBI advisory about a new ransomware gang called BlackSuit should interest in-house lawyers when considering whether to advise paying ransom.

Pharmacists File Class Action Over Change Healthcare Cyberattack

Pharmacists File Class Action Over Change Healthcare Cyberattack

Read why the lead plaintiff in a class action over the Change Healthcare cyberattack alleged lax security and support failure.

Windows Updates Could Be a Downgrade Attack

Windows Updates Could Be a Downgrade Attack

Beware of Windows updates that trick operating systems into installing an older system version, a so-called downgrade attack.

SSH Access Vulnerabilities Result of Poor Implementation

SSH Access Vulnerabilities Result of Poor Implementation

Learn about SSH access vulnerabilities related to server-side deployments and implementations in wireless access points, routers, and firewalls.

Apple’s Lawsuit Against NSO Will Proceed

CISOs Relieved By Dismissal of SEC SolarWinds Charges

Learn more about why CISOs felt under siege and targeted before the SEC SolarWinds charges were dismissed and what this means for the cybersecurity community.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top