Risk Management

Navigating the Shift to Post-Quantum Cryptography

Navigating the Shift to Post-Quantum Cryptography

Explore why law firms advising clients in sensitive industries must ensure they plan to shift to post-quantum cryptography.

Apple’s Lawsuit Against NSO Will Proceed

Rising Data Breach Class Actions: Key Insights for Legal Defense and Cybersecurity Preparedness

Read why companies should invest in cybersecurity as data breach class actions are rapidly increasing, with nearly three times the number filed in 2023 as in 2022.

Anticipating Class Action Litigation: A Playbook for In-House Counsel

Anticipating Class Action Litigation: A Playbook for In-House Counsel

Class action litigation continues to rise. Learn about the key things in-house counsel should know before and after their company has been served with a complaint.

Cybersecurity Issues Are Changing Board Governance Duties

Cybersecurity Issues Are Changing Board Governance Duties

 Learn why many directors don’t understand their board governance duties regarding cyber risk and focus too much on technical protections. 

How Master Data Management Can Keep Big Companies from Drowning in Useless Data

How Master Data Management Can Keep Big Companies from Drowning in Useless Data

Read why master data management can make or break reliability in organizations with multiple business units in which data silos lead to errors.

Halliburton Data Breach Was Significant, Prompted Notifications

Halliburton Data Breach Was Significant, Prompted Notifications

Understand why the Halliburton data breach was significant, prompting communications with customers and law enforcement and causing a partial shutdown of systems.

Hackers Are Stealing Encrypted Data For Quantum Computing To Decrypt Later

Hackers Are Stealing Encrypted Data For Quantum Computing To Decrypt Later

Learn why hackers are stealing encrypted data that will only become valuable when quantum computing that breaks cryptography becomes available.

New WordPress Security Requirements To Counter Supply Chain Attacks

New WordPress Security Requirements To Counter Supply Chain Attacks

Learn why WordPress security requirements are being implemented to counter vulnerabilities in old plugins and themes that serve as entry points for attackers.

When Paying Ransom Fails: The Risks of Faulty Decryptors in Ransomware Attacks

When Paying Ransom Fails: The Risks of Faulty Decryptors in Ransomware Attacks

Paying ransom doesn’t guarantee recovery. Read how faulty decryptors in ransomware attacks leave companies without access to their files and still at risk.

Why You Need to Implement Data Migration Best Practices

How A Holistic Compliance Approach Enhances Effectiveness

Discover how a holistic compliance approach leverages data from Legal, HR, IT, and more to meet regulatory expectations and enhance program effectiveness.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top