Data Privacy & Cybersecurity

Who Is Reading Your Email Exchanges With Your Client?

The vast majority of attorneys, more than 90 percent, routinely send confidential information over email, most frequently over Gmail. These […]

Cybersecurity Primer From The Horse’s Mouth

A global risk management company interviews its own chief information security officer for an inside take on the essentials of […]

Know Industry Compliance Standards Before Employing Container Security

More companies are focusing on container security to ensure that they don’t ship software with known vulnerabilities, to protect sensitive […]

New Patent Heightens Privacy Concerns

As of this month Amazon has a patent that arms Alexa with a voice analyzer capable of revealing characteristics such […]

Employees’s Unintended Cyber-Breach Is An Underrated Threat

The threat of the rogue employee or the vengeful former-employee is a frequent subject of cybersecurity alerts, and it’s a […]

SEC Turning The Screws On Cybersecurity

In the face of a largely ineffectual “patchwork system of federal and state laws,” the SEC has emerged as a major de facto U.S. regulator of cybersecurity…

Lifeless Eyes, Battery-Operated Lungs

“Lifeless eyes dilate at your approach. Battery-operated lungs suck in stale air, hypnotically wheezing with inhuman rhythm. A plastic chest […]

Clever New Twist In Phone Phishing

A variation on the now common phishing scam, dubbed “vishing,” has until recently had a predictable modus operandi, beginning with […]

Blockchain Technology In Mainstream Manufacturing

Recent global surveys by PWC and Deloitte found that most executives think blockchain technology is “scalable” and that it will […]

Proactive Approach To Data Protection

Threat intelligence is a process of identifying and collecting data, and analyzing artifacts from the past to create an actionable […]

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top