Data Privacy & Cybersecurity

What Are the Different Types of Cyberattacks and How Do They Work?

What Are the Different Types of Cyberattacks and How Do They Work?

To win the battle against cybercrime, companies need to understand how they are being attacked. Cyberattacks are launched against organizations every […]

General Counsels’ Role In Digital Transformation

General Counsels’ Role In Digital Transformation

Cutting-edge tech – AI, cryptocurrency, blockchain, metaverse environments – provide advanced levels of innovation and efficiency, but they also introduce […]

Enterprise Risk Management (ERM) or Governance, Risk and Compliance (GRC)?

Some Ransomware Gangs No Longer Using Malware: What’s Next?

Several ransomware gangs have stopped using malware to encrypt targets’ files and have switched to a data theft/extortion approach to get […]

In the Cloud? You May Need a Cloud Cybersecurity Framework

The cloud is the future of corporate architecture. It’s economical, it’s scalable, it’s flexible and it’s not your responsibility. That […]

AI Is Super-Charging the Client Side In Workers’ Comp Disputes

According to the Erwin McCane & Daly firm, AI is already affecting workers comp insurance on the client side. It […]

LockBit Ransomware Gang Publishes Files, Federal Reserve Lowballs Ransom

A Sure-Fire Short Selling Tactic

The FBI warns that the BianLian ransomware gang has evolved a new method of monetizing hacks after a targeted ransomware […]

Montana Enacts Data Privacy Law

The Montana Consumer Data Privacy Act, passed unanimously by the state legislature and signed into law on May 19, was […]

Big Pharmacy Services Provider Breached

An “unknown third party” hacked into computer systems belonging to PharMerica, a leading U.S. pharmacy service provider, and apparently stole […]

insurance policy

Insurance Coverage for Email Scams

A genuine looking email is sent to a company’s accounts payable department with instructions from its president to pay money […]

Image of human figure on a compouter screen, as he is pulling a rope attached to an envelope that is imaged on an adjacent computer screen.

Be on the Lookout for Cactus Ransomware!

A new ransomware operation called Cactus is exploiting vulnerabilities in network devices with enhanced security features, or VPN appliances, to […]

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top