Data Privacy & Cybersecurity

Robot hand typing on keyboard

Generative AI: Making It Easier for Scammers and Thwarting Them at the Same Time

Before generative AI was publicly available, multiple resources were required to run disinformation campaigns effectively. However, this new technology has made it […]

New Technique to Fool Ransomware Protection

Global Food Company Hacked

Hackers breached the network of Sysco, a big global food distribution company, earlier this year. In an internal memo sent […]

Cybersecurity Impacted by Hybrid and Remote Workers

The impact of the hybrid workforce on cybersecurity is becoming a major issue for Chief Information Security Officers (CISOs) and […]

copyright symbol

The Paradox of Executive Behaviors in Content Sharing and Copyright

From research to medical communications to legal to marketing, sharing content with colleagues across job roles and departments is critical. […]

Interview with Robert Scott, VP of Legal at Lattice, Spotlight Series by DataGrail

Q&A with Robert Scott, VP of Legal, Lattice

Our interview with Robert focuses on how he successfully evangelizes and scales privacy to ensure cross-functional alignment. Robert takes us […]

Three business people gathered around a laptop on a table, with vague technology-suggesting icons superimposed over the blue-tinged photo. One of the persons appears to be explaining something to the other two.

Maybe They Are Avatars

The metaverse is so huge and complicated that JPMorgan Chase Bank, the fifth biggest bank in the real world, got […]

Can Cybersecurity Training Prevent Data Breaches?

An IBM report states that the global average cost for data breaches grew to $4.24 million in 2021. The report […]

New Ransomware Gang Hits Sony

Cascading Software Supply Chain Attack

A hack of the business solutions firm 3CX was revealed in March when customers complained that various cybersecurity products had […]

A somewhat abstract illustration of a finger pointing, a fingerprint image superimposed over it, with various object in space around it.

BIPA Hits a Speed Bump

A series of Illinois Supreme Court rulings taking an expansive view of the Illinois Biometric Information Privacy Act came to […]

Break Down Your Disaster Recovery and Cybersecurity Silos

Having a disaster recovery (DR) plan and cybersecurity strategy in place is critical for any organization. DR is important for […]

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top