Data Privacy & Cybersecurity

Zero Trust Cybersecurity Becoming Essential for Legal Departments

Zero Trust Cybersecurity Becoming Essential for Legal Departments

Discover how zero trust cybersecurity reshapes risk management for legal professionals, ensuring robust protection through continuous verification.

CISA and FBI Give Advisory on BlackSuit Ransomware Gang

CISA and FBI Give Advisory on BlackSuit Ransomware Gang

 A new FBI advisory about a new ransomware gang called BlackSuit should interest in-house lawyers when considering whether to advise paying ransom.

Pharmacists File Class Action Over Change Healthcare Cyberattack

Pharmacists File Class Action Over Change Healthcare Cyberattack

Read why the lead plaintiff in a class action over the Change Healthcare cyberattack alleged lax security and support failure.

Windows Updates Could Be a Downgrade Attack

Windows Updates Could Be a Downgrade Attack

Beware of Windows updates that trick operating systems into installing an older system version, a so-called downgrade attack.

SSH Access Vulnerabilities Result of Poor Implementation

SSH Access Vulnerabilities Result of Poor Implementation

Learn about SSH access vulnerabilities related to server-side deployments and implementations in wireless access points, routers, and firewalls.

Apple’s Lawsuit Against NSO Will Proceed

CISOs Relieved By Dismissal of SEC SolarWinds Charges

Learn more about why CISOs felt under siege and targeted before the SEC SolarWinds charges were dismissed and what this means for the cybersecurity community.

White House Backs Harmonizing Cybersecurity Regulation

Court Affirms IT Administrator’s Access Did Not Violate Regulations

Learn more about Abu v. Dickson, which highlights critical considerations about the boundaries of an IT administrator’s access in corporate disputes.

Colorado AI Law to Protect Consumers from Algorithmic Discrimination

Colorado AI Law to Protect Consumers from Algorithmic Discrimination

Learn more about Colorado’s AI law, which sets a precedent requiring businesses to prevent algorithmic discrimination and ensure transparency in AI systems.

Addressing the Surge in Cyber Insurance Claims With Boundary Device Security

Addressing the Surge in Cyber Insurance Claims With Boundary Device Security

Cyber insurance claims are on the rise. Discover how securing boundary devices and adopting robust strategies can help safeguard against escalating threats.

The Growing Role of Malware-as-a-Service in Sophisticated Attacks

The Growing Role of Malware-as-a-Service in Sophisticated Attacks

 Malware-as-a-Service is enabling low-skilled attackers to launch complex cyber threats. Discover how these evolving tactics are reshaping the security landscape

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top