Risk Management

Five Smart Tips for Legal Operations Transformation

Aligning Global Sustainability Reporting Standards

Discover the significance of aligning global sustainability reporting standards with the publication of an interoperability document.

Under the Radar Cyberattacks

Cyber Breaches Expose Vulnerabilities In Online Transactions

 Discover how cyber breaches expose vulnerabilities in cross-border transactions and why advanced security protocols safeguard vital financial information.

Understanding the Difference Between Data Retention and Data Preservation

How Unified Compliance Technology Can Keep Errors from Escalating into Risks

Learn how unified compliance technology helps organizations prevent minor oversights from becoming major risks reporting, training, and risk management.

Understanding the Difference Between Data Retention and Data Preservation

The Growing Legal Perils for Chief Information Security Officers

Chief information security officers face unprecedented legal risks. Learn how to navigate scrutiny and avoid being targeted in the fallout of a cyberattack.

BlackBaud Admits Failure To Disclose, Pays $3 Million Penalty

The Crowdstrike Incident is a Cybersecurity Wake-Up Call About Software Updates

Read how the CrowdStrike incident and its “Blue Screen of Death” spotlight cybersecurity vulnerabilities by relying on unreliable technologies.

Delaware Ruling Marks Potential Shift in Approach to SPAC-Related Claims

Federal Banking Agencies Address Risks in Bank-Fintech Partnerships

Federal banking agencies issued a joint statement to address risks in bank-fintech partnerships, highlighting the need for enhanced compliance practices.

Don’t Put a Target on Legal Ops in a Downturn

Regulators Reiterate Risk Management Guidance for Banks Using Third-Party Providers

Learn more about the FDIC, OCC, and Federal Reserve Board’s risk management guidance for banks utilizing third-party vendors offering bank deposit products.

Business and Commercial Litigation in Federal Courts

Open-Source Library Used to Distribute Malware

Cloudflare is advising its customers to stop using Polyfill, an open-source library, to prevent malware. Learn more about open-source cybersecurity weaknesses.

Navigating Cyber Risk Management: Strategies for Effective Protection

Data Broker Inferences Can be Wildly Inaccurate

Discover how data broker inferences shape digital identities and impact privacy, with insights on protecting personal information from data mining.

Legal Ops Can Make Informed Decisions by Mastering Data Analytics

Using Metrics For Measuring Cyber Resilience

Learn more about key metrics to gauge cyber resilience, which focuses on recovery, and cybersecurity, which defends against attacks.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top