Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Ransomware has come a long way since the 1989 “AIDS Trojan.” Distributed by diskette, it encrypted the file names and directories of its victims. Ransom demands have also come a long way. The AIDS Trojan attack demanded $189 for the decryption key. In 2019 ransomware demands topped $12M.
*May exclude premium content
By Jared Coseglia
The second part of our analysis of complexities of staffing in a post-pandemic job market in the data privacy, cybersecurity, and e-discovery/legal technology verticals covers all the hiring trends in Q3 2021 as well as what is coming in Q4 and beyond.
By Mike Paul
This article looks at each stage of a cyberattack, by way of a fictitious attack that took over a real estate agent’s email account.
By Emil Sayegh
For all of that is created and consumed during October's Cybersecurity Month, it is disappointing to see how each year after all the thoughts have been shared, major security incidents continue to emerge. We need to begin to take stock of all the advice given during this month and put it to immediate practice.
By Gloria Huang
Litigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it’s based on data that is complete and accurate.