Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
For many of us, the term “data breach” conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats. Insider threats can be malicious, but often they are accidental. Rather than a shadowy scoundrel, your greater security risk might very well be Alice in the accounting department, who absentmindedly leaves her laptop on the bus.
By Steve Salkin
A Roundtable Discussion
Experts share their experience and insight on the evolving acceptance and use of AI and advanced analytics tools for e-discovery — and beyond.
By Nina Cunningham
In an environment of moving targets, it seems unimaginable that insurance against cybersecurity attacks can be robust enough to provide real protection. There are many types of risks involved, and some include physical damage to property.
By Ankur Sheth and Jano Bermudes
Apart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.
By Samantha Green
With countries around the world examining and strengthening their data protection laws, this agreement could be the first of many and will undoubtedly have global repercussions.