Risk Management

Stolen Credentials Led to Hacks At Disney, Finastra, Schneider Electric, Microsoft, Roku

Stolen Credentials Led to Hacks At Disney, Finastra, Schneider Electric, Microsoft, Roku

Learn why stolen credentials are the top cyber threat, fueling 80% of web app breaches, and how training, MFA, and modern tools can safeguard your firm.

Clarifying New Jersey Protections Against Algorithmic Discrimination in AI

Clarifying New Jersey Protections Against Algorithmic Discrimination in AI

Discover how New Jersey’s new guidance addresses algorithmic discrimination in AI and automated tools, ensuring compliance with the Law Against Discrimination (LAD).

The Storm of Data Security Class Actions Will Only Intensify

The Storm of Data Security Class Actions Will Only Intensify

Explore why challenges for data security officials and greater consumer awareness of privacy rights contribute to a profusion of data security lawsuits.

Shared Responsibility Challenges in Cloud Security

Shared Responsibility Challenges in Cloud Security

Discover key cloud security risks, including shared responsibility challenges, rising ransomware attacks, and strategies for mitigating threats effectively.

Washington State Sues T-Mobile Over its Cybersecurity Failures

Washington State Sues T-Mobile Over its Cybersecurity Failures

Read about litigation against T-Mobile over a data breach exposing millions to identity theft, alleging years of cybersecurity failures and misleading customer assurances.

Strengthening OSS Security in the Software Supply Chain

Strengthening OSS Security in the Software Supply Chain

Learn more about rising cyberattack threats to OSS, making transparency, observability, and proactive updates essential to securing the software supply chain.

Turn Annual Legal Budget Planning into a Strategic Advantage

Why GCs Should Approach Litigation Valuation Like a Litigation Funder

Take a page from the playbook of litigation funders and apply their methodology to litigation valuation at your organization.

Are Cyber Insurance Rates Masking Deeper Issues With Uninsured Risk?

Are Cyber Insurance Rates Masking Deeper Issues With Uninsured Risk?

Delve into why cheaper cyber insurance rates are masking deeper issues, including more uninsured risk and under-insured third parties.

Using Core Compliance Principles for Enduring Success Amid Shifting Political Landscapes

Using Core Compliance Principles for Enduring Success Amid Shifting Political Landscapes

Explore navigating regulatory shifts under a new presidential administration by focusing on core compliance principles that ensure long-term resilience and success.

Why We Need To Be Cautious About the Use of AI in Human Resources

Why We Need To Be Cautious About the Use of AI in Human Resources

Read about the use of AI in human resources and how it can generate significant liability for your business. Learn how to protect your organization.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top