Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
For many of us, the term “data breach” conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats. Insider threats can be malicious, but often they are accidental. Rather than a shadowy scoundrel, your greater security risk might very well be Alice in the accounting department, who absentmindedly leaves her laptop on the bus.
*May exclude premium content
By Brian Schrader
AI is in many ways still in its infancy, and it’s important to realize that platforms utilizing this technology are heavily dependent on constant human interaction and training.
By Steve Salkin
Part Two of a Two-Part Article
Cybersecurity Law & Strategy partnered with our ALM sibling Legaltech News to ask cybersecurity and e-discovery experts what they thought the key trends of 2019 and what they expect to see in 2020. Part Two looks at e-discovery.
By Gary Salman
During the past few months, there has been a significant paradigm shift in the cybersecurity world. Threat actors from Russia, in particular, have significantly enhanced their capabilities to target individual businesses and Managed Service Providers (MSPs) or IT companies. It is critical that lawyers, their firms and the companies they serve be aware of these threats and take the appropriate measures to proactively secure their own — and their clients’ — sensitive and private information.
By Megan Miller
Law Firms Are Following the Lead of Their Corporate Clients In Implementing Legal Operations Methodologies
Legal operations as a discipline within corporate legal departments is receiving more attention, funding and staffing over the last few years.