from-tgc

Design Patent Bar Proposed

Companies in certain industries – bicycle manufacturers, mobile phones, robots – find that design patents offer protections that utility patents […]

Protecting the Crown Jewels: Your Data

Data security is becoming increasingly complex, and the datasets that require securing are growing rapidly. Rubrik Zero Labs’ report on […]

How to Choose Your Ediscovery Billing Method

Are you being charged for each user you have regardless of whether or not they log in to your ediscovery […]

Per Se or Rule of Reason?

Section 2 of the Sherman Act can be enforced civilly or criminally. It’s been a long time since the DOJ […]

Be on the Lookout for Cactus Ransomware!

A new ransomware operation called Cactus is exploiting vulnerabilities in network devices with enhanced security features, or VPN appliances, to […]

Is Deference to Risk Committees Hazardous?

Publicly traded U.S. bank holding companies with consolidated assets of $50 billion, along with some other financial entities, are required […]

Capturing Key Contract Data

In an interview, Karen Meyer, CEO of Contract Logix, discusses contract lifecycle management and how it can help general counsel […]

Managing Collaboration Data Equals Retention and Technology

In the second of a four-part blog series, Jim Gill of Hanzo discusses collaboration data challenges faced by organizations prior to […]

Intruder Scanner Foils API Hackers

As some legal firms and legal ops departments have begun building their own client-facing applications, clients will be demanding a single […]

Generative AI: Making It Easier for Scammers and Thwarting Them at the Same Time

Before generative AI was publicly available, multiple resources were required to run disinformation campaigns effectively. However, this new technology has made it […]

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top