Data Privacy & Cybersecurity
Learn why confusing the roles of information governance and data governance can lead to serious misalignment, inefficiencies, and compliance risks.
Discover what makes Qilin’s use of Linux encryptors in Windows via Windows Subsystem for Linux (WSL) a sophisticated evasion method challenging traditional security defenses.
Explore how employees and AI tools are bypassing outdated access controls, creating new security, compliance, and oversight challenges for companies.
Read how a new phishing campaign on LinkedIn targeting executives uses trust in professional networks to steal Microsoft credentials and session cookies.
Learn how Cloud-focused Jingle Thief campaigns exploit retail cloud systems to issue and monetize stolen gift cards, creating complex investigative and compliance risks.
Discover what experts say the AWS outage reveals about concentration risk, and the cascading effects of localized cloud disruptions on global services.
Dive into how hackers infiltrated Canada’s critical infrastructure and manipulated water, energy, and agriculture systems through exposed industrial controls.
Learn why fines against a UK outsourcing firm show multinational GCs the necessity for risk-based testing, SOC accountability, and robust cybersecurity.
Read why energy firms face growing cyber threats from hidden internet exposures, unmonitored IPv6 assets, and blind spots in traditional security tools.
Learn how legal risk and data governance intersect as organizations create, license, and deploy datasets in today’s AI-driven business environment.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.