Risk Management

“Stupid Patent” Award From Electronic Frontier Foundation

The Electronic Frontier Foundation gives its monthly booby prize in part with an eye toward shining a light on what […]

Trends In “Follow-On” Litigation

A dam that burst in Brazil, a natural gas leak in a neighborhood near Los Angeles, and Volkswagen’s emissions software […]

A Roadmap To “Reasonable” Cyber Protection

A report issued by the attorney general of California defines what constitutes minimum standards of “reasonable security” for personal information […]

What Are Your Soft Targets For A Cyber Attack?

Based on analysis of cyber attack patterns in 2015,, a report from Hewlett Packard Enterprise predicts likely trends in attacks […]

Uptick In Big Class Action Settlements

AIG and Bear Stearns top a list of defendants that took major hits in class action settlements last year. The […]

Fingerprint Technology For Employers

Employers can adopt fingerprint recognition technology for a variety of purposes, including securing physical or computer access and as an […]

Workplace Wellness Programs Get Mixed Reviews

Do workplace wellness programs really improve workers’ health? It’s a question ripe for the asking for a surprising number of […]

If It’s Not A Breach, Don’t Report It

Often when consultants are called in to do a forensics investigation after a suspected breach, they find that in fact…

Separate Agreements For Software Purchase, Implementation

When companies buy specialized software and pay an expert to adapt it and set it up, there are two separate […]

The Case For Lawyers As Cyber-Risk Leaders

In a Today’s General Counsel article, the writer, the general counsel of a cybersecurity technology company, argues his case in […]

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top