Risk Management
The Electronic Frontier Foundation gives its monthly booby prize in part with an eye toward shining a light on what […]
A dam that burst in Brazil, a natural gas leak in a neighborhood near Los Angeles, and Volkswagen’s emissions software […]
A report issued by the attorney general of California defines what constitutes minimum standards of “reasonable security” for personal information […]
Based on analysis of cyber attack patterns in 2015,, a report from Hewlett Packard Enterprise predicts likely trends in attacks […]
AIG and Bear Stearns top a list of defendants that took major hits in class action settlements last year. The […]
Employers can adopt fingerprint recognition technology for a variety of purposes, including securing physical or computer access and as an […]
Do workplace wellness programs really improve workers’ health? It’s a question ripe for the asking for a surprising number of […]
Often when consultants are called in to do a forensics investigation after a suspected breach, they find that in fact…
When companies buy specialized software and pay an expert to adapt it and set it up, there are two separate […]
In a Today’s General Counsel article, the writer, the general counsel of a cybersecurity technology company, argues his case in […]
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.