Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Trust has always been a key instrument of economics. Up until recently, central banks have acted as the metaphorical custodian of trust, employing complex processes that force populations to participate in bank accounts and credit cards to earn trust benefits, like credit scores. Yet, devastating moments such as the 2008 U.S. financial crisis that took an enormous taxpayer-funded bailout showed the same centralized and slow processes were weakening and could not adapt quickly enough in a digital economy. Further, banks have become the number one target for malicious hackers. As a result, banking systems, credit rating agencies and other traditional legal instruments no longer remain effective mechanisms for P2P reputation and trust measurement.
By Paige Schaffer
If 2017 was considered the “year of the data breach” as the number of incidents hit a new record high of 1,579, 2018 might get even more serious. Just a little more than halfway through 2018, the number and scale of data breaches that have already been reported is staggering.
By Adam Schlagman
Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.
By Mark Sangster
A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).
By David A. Greetham
Cloud service providers to the federal government must meet the rigorous requirements of the Federal Risk and Authorization Management Program. FedRAMP, as it’s known, is designed to help federal agencies follow the government’s “cloud first” policy, and includes detailed and strict encryption and other cybersecurity requirements.