Risk Management

Halliburton Data Breach Was Significant, Prompted Notifications

Halliburton Data Breach Was Significant, Prompted Notifications

Understand why the Halliburton data breach was significant, prompting communications with customers and law enforcement and causing a partial shutdown of systems.

Rethinking Identity Risk Through Attack Paths

Hackers Are Stealing Encrypted Data For Quantum Computing To Decrypt Later

Learn why hackers are stealing encrypted data that will only become valuable when quantum computing that breaks cryptography becomes available.

New WordPress Security Requirements To Counter Supply Chain Attacks

New WordPress Security Requirements To Counter Supply Chain Attacks

Learn why WordPress security requirements are being implemented to counter vulnerabilities in old plugins and themes that serve as entry points for attackers.

How In-House Counsel Should Respond to White-Collar Crimes Allegations

When Paying Ransom Fails: The Risks of Faulty Decryptors in Ransomware Attacks

Paying ransom doesn’t guarantee recovery. Read how faulty decryptors in ransomware attacks leave companies without access to their files and still at risk.

Why You Need to Implement Data Migration Best Practices

How A Holistic Compliance Approach Enhances Effectiveness

Discover how a holistic compliance approach leverages data from Legal, HR, IT, and more to meet regulatory expectations and enhance program effectiveness.

Retail Execs Believe Dynamic Computing Will Fuel Growth Despite Cyber Threats

Retail Execs Believe Dynamic Computing Will Fuel Growth Despite Cyber Threats

Read why retailers believe dynamic computing will fuel growth and boost supply chains, but 82% admit rising cyber risks challenge resilience efforts.

Data Recovery and Cybersecurity Should Be Part of a Disaster Recovery Plan

Data Recovery and Cybersecurity Should Be Part of a Disaster Recovery Plan

Explore why an effective disaster recovery plan (DRP) stresses data recovery and includes fundamental cybersecurity and customer communication.

cyber security ransomware

Small Businesses Are At Risk From Ransomware Attacks

Discover why small businesses are at risk from cyber threats, as they often lack the resources and expertise necessary to prevent ransomware attacks.

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Discover how developers can manage the evolving risks in renewable energy projects, from supply chain challenges to compliance with the Inflation Reduction Act.

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Learn how supply chain cyberattacks use the trust between companies that share software to find and exploit weaknesses in their mutual cybersecurity.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top