Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
For many of us, the term “data breach” conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats. Insider threats can be malicious, but often they are accidental. Rather than a shadowy scoundrel, your greater security risk might very well be Alice in the accounting department, who absentmindedly leaves her laptop on the bus.
By Sundhar Rajan
Organizations that continue to be complacent about data security ignore the considerable risks posed by a breach: extended downtime, loss of billable hours, destruction or loss of sensitive data and work product, and the potentially catastrophic costs associated with repairing the damage — both to their technology infrastructure and to their reputation and brand.
By Karen A. Schuler
How Middle Market Companies Can Shore Up Their Data Privacy
The most significant overhaul to the EU’s data privacy policies in over 20 years, with extraterritorial reach, forced American businesses to remediate, and in some cases, overhaul their data privacy governance programs. But the GPDR was just the beginning. Organizations seeking compliance with the growing number of data privacy regulations will need to remain vigilant, especially for organizations that rely heavily on personal data.
By Jared Coseglia
A Reflection on the Year Behind, the Years Ahead, and Why Privacy Means So Much to Us
Part Two of a Two-Part Article
Part two of The State of the U.S. Privacy Job Market, 2019 will outline what is happening within service providers, consultancies, and vendors will touch briefly on government agencies and will predict the near-future state of the U.S. privacy job market.
By Mike Hamilton
A review of recent cases involving e-discovery.