Account

Sign in to access your account and subscription

Cover Story Cybersecurity Law & Strategy

  • This article covers cyber trends and tips for organizations to explore in order to be better equipped to anticipate and respond to cyber incidents before a devastating breach occurs. The outcome? Diminished chance of class action activity, compliance violations, lost business, and mounting costs.

    December 01, 2023Brandon Hollinder
  • While the societal impact of technology is not a new concept, GenAI stands out due to its accessibility to the public and its profound influence on knowledge-based industries like law. In addition to boosting efficiency and productivity, GenAI's new technological capabilities hold the promise of empowering lawyers to offer more precise and insightful guidance to their clients.

    November 01, 2023Joy Holley
  • In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.

    December 01, 2017Michael Bahar, Bronwyn McDermott and Trevor J. Satnick
  • In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.

    September 02, 2017Chuck Kunz and Ian McCauley
  • The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?

    May 02, 2017Aaron D. Charfoos and Sean C. Griffin
  • When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

    April 02, 2017Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker