Data Privacy & Cybersecurity

Zoom Epitomizes the Concept of Negative Externalities

The software industry thrives by being early to market and putting off bug fixes until later releases, the so-called “move […]

Unprotected Data In the Cloud

Companies are consistently making a big cybersecurity error, and it is starting to show up statistically. The error is leaving cloud […]

In Celebrity Law Firm Ransom Attack, Hackers Up The Ante, Threaten Trump

New York’s Grubman, Shire, Meiselas & Sacks has been hit with a crippling ransom attack by the hacker group REvil, […]

Law Firm Hacked, A-List Clients’ PI Stolen

Grubman Shire Meiselas & Sacks, a media and entertainment law firm with a roster of well-known clients, confirmed that it […]

A Warning To Companies About Breach Notification

It’s become common wisdom – gleaned in part from witnessing some disastrous missteps by companies like Yahoo and credit reporting […]

International Hacker Group Busted

On May 5, Europol announced the arrest of five Polish hackers who were part of the Infinity Black hacking group. […]

How To Prevent Zoom Bombing

If you share your meeting link on social media or other public forums your event becomes public, and anyone with […]

Employees Working At Home? Read Your Cyber Policy

Some policies exclude devices not owned by the “named insured”; some require that the named insured have an on-the-record….

GC Should Lead Security Management And Risk

Information security needs to be a high-priority collaborative effort involving IT, representatives from major business units, HR, corporate communications, internal and security experts and in some cases outside consultants

AI Steps Into the Data Breach

It was hard to find qualified cybersecurity professionals before the pandemic. Now it’s nearly impossible. Couple that with threats that […]

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top