Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
In 2014, now a decade ago in cyber-time, I interviewed TecSec CEO and security specialist, Jay Wack. I asked about the security of the cloud, which at the time was starting to transform the storage of electronic information. “There’s really no such thing as the cloud,” Mr. Wack told me, “there are only other people’s computers.” I was not entirely surprised by his answer. He had a snappy way of coming to conclusions. In this case I said, “Oh, something like time-sharing in the old days.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud. Even then, Jay Wack warned: “You cannot secure the network, only the data.”
By Laura Jehl, Robert Musiala, Linda Goldstein, Fernando Bohorquez and Amy Mudge
While inflated expectations abound, the advertising industry is emerging as one of the more immediate, substantive and compelling use cases for blockchain technology.
By Thomas McThenia and Richard Markow
Like poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.
By Michael Bahar and Kristen Bertch
Technologies are often pitched as solutions, if not game-changing solutions. Indeed, many times they are, but no solution comes without the seeds of its own costs and challenges. For pragmatic and regulatory compliance reasons, it is increasingly important for boards, senior executives and general counsel to sufficiently understand technologies, not just their potential promise.
By Jeffrey Atteberry
The social, economic, and political forces pushing for a comprehensive overhaul of the nation’s privacy regime are numerous, and many see 2019 as presenting the best opportunity yet for passage of federal data privacy legislation.