Risk Management

New WordPress Security Requirements To Counter Supply Chain Attacks

New WordPress Security Requirements To Counter Supply Chain Attacks

Learn why WordPress security requirements are being implemented to counter vulnerabilities in old plugins and themes that serve as entry points for attackers.

When Paying Ransom Fails: The Risks of Faulty Decryptors in Ransomware Attacks

When Paying Ransom Fails: The Risks of Faulty Decryptors in Ransomware Attacks

Paying ransom doesn’t guarantee recovery. Read how faulty decryptors in ransomware attacks leave companies without access to their files and still at risk.

Why You Need to Implement Data Migration Best Practices

How A Holistic Compliance Approach Enhances Effectiveness

Discover how a holistic compliance approach leverages data from Legal, HR, IT, and more to meet regulatory expectations and enhance program effectiveness.

Retail Execs Believe Dynamic Computing Will Fuel Growth Despite Cyber Threats

Retail Execs Believe Dynamic Computing Will Fuel Growth Despite Cyber Threats

Read why retailers believe dynamic computing will fuel growth and boost supply chains, but 82% admit rising cyber risks challenge resilience efforts.

Data Recovery and Cybersecurity Should Be Part of a Disaster Recovery Plan

Data Recovery and Cybersecurity Should Be Part of a Disaster Recovery Plan

Explore why an effective disaster recovery plan (DRP) stresses data recovery and includes fundamental cybersecurity and customer communication.

cyber security ransomware

Small Businesses Are At Risk From Ransomware Attacks

Discover why small businesses are at risk from cyber threats, as they often lack the resources and expertise necessary to prevent ransomware attacks.

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Discover how developers can manage the evolving risks in renewable energy projects, from supply chain challenges to compliance with the Inflation Reduction Act.

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Learn how supply chain cyberattacks use the trust between companies that share software to find and exploit weaknesses in their mutual cybersecurity.

Massive Increase In Cyber Threats Fueled By Use of Unsecured Work-From-Home Devices

Massive Increase In Cyber Threats Fueled By Use of Unsecured Work-From-Home Devices

Read how cyber threats have risen 400% since the pandemic, mostly because of unsecured work-from-home devices and networks.

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Read how supply chain cybersecurity isn’t just about defenses. Professor SK Jeong says vulnerabilities often lie with your suppliers.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top