Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Use a WISP As a Roadmap to Detail Data Security Processes and Controls Image

Use a WISP As a Roadmap to Detail Data Security Processes and Controls

Alfred R. Brunetti

The written information security plan (WISP) is not just another compliance document, it's a practical roadmap that turns abstract data protection duties into concrete business practices.

Features

From Reactive to Proactive: Navigating AI, Privacy and Security Compliance Across APAC’s Expanding Regulatory Landscape - Part Two Image

From Reactive to Proactive: Navigating AI, Privacy and Security Compliance Across APAC’s Expanding Regulatory Landscape - Part Two

Brandon Hollinder & Jon Kessler

APAC is awash with recent changes in AI, privacy and cybersecurity regulations. Part one of this article examined the specifics of those changes and the paradigm shift they are precipitating. Part two explores the real-world implications of those changes and key takeaways for compliance teams.

Features

The Investigative Complexities of the TAKE IT DOWN Act Image

The Investigative Complexities of the TAKE IT DOWN Act

Johnathan Bridbord

The increasing prevalence of cyberstalking, harmful deepfakes and online harassment is creating profound risks for individuals and organizations. So much so that Congress has implemented a federal statute designed to shift liability toward online platforms and provide victims with enforceable removal rights.

Features

Five Operational Foundations To Determine Whether Your Tech Investments Will Succeed In 2026 Image

Five Operational Foundations To Determine Whether Your Tech Investments Will Succeed In 2026

Rick A. Campbell

Law firms are spending record amounts on technology right now. The difference between technology investments that succeed and those that fail may have less to do with the tools themselves than the operational foundation beneath them.

Features

Use a WISP to Detail Data Security Processes and Controls Image

Use a WISP to Detail Data Security Processes and Controls

Alfred R. Brunetti

The written information security plan (WISP) is not just another compliance document, it's a practical roadmap that turns abstract data protection duties into concrete business practices.

Features

AWS Outage Demonstrates Risks of Cloud Services Image

AWS Outage Demonstrates Risks of Cloud Services

Brendan Pierson

The recent Amazon Web Services outage, which incapacitated online services across the country, highlights risks companies must manage as they increasingly depend on cloud services, lawyers say.

Features

Trends In Patent Policy and Enforcement: What Cybersecurity Companies Need to Know Image

Trends In Patent Policy and Enforcement: What Cybersecurity Companies Need to Know

Manny Caixeiro

Forward-thinking cybersecurity companies should recognize that the patent world is at a moment of change. A tremendous amount of thought, financial investment, and political capital is being devoted to transforming patents into assets that are central to the economy, international trade, and national defense. The incentives for obtaining and aggressively monetizing patents are increasing. Companies that take steps now to navigate these changes may be rewarded with significant competitive advantages.

Features

Pioneering AI In Law Firm Cybersecurity: Balancing Innovation With Risk of Using GANs and Other Novel Solutions Image

Pioneering AI In Law Firm Cybersecurity: Balancing Innovation With Risk of Using GANs and Other Novel Solutions

Michel Sahyoun

The cybersecurity arms race shows no signs of slowing. Attackers continue developing more sophisticated techniques, forcing defenders to evolve accordingly. Generative adversarial networks (GANs) represent one of the most promising developments in the defensive arsenal, but only when deployed wisely. Organizations should evaluate their risk appetite and technical capabilities carefully.

Features

Anatomy of a Prompt: Real Training for Using AI Image

Anatomy of a Prompt: Real Training for Using AI

Sean A. Harrington & Andy Kim

With generative AI, research time has collapsed and review time has expanded. The model can draft in minutes, which means you now spend more time asking whether the draft is accurate, defensible, and on brand. Prompting skill is not about magic words. It is about shaping the first draft so the review phase is shorter and you are not fixing preventable mistakes. A good prompt removes ambiguity, narrows scope, and sets expectations. The better the prompt, the less the scramble at the end.

Features

Top 7 Ways Law Firms Can Fortify Their Security and Protect Client Trust Image

Top 7 Ways Law Firms Can Fortify Their Security and Protect Client Trust

Jacob Mathai

In the minds of your clients, trust and security are intertwined. As stewards of confidential client information, law firms must go beyond minimum compliance, setting a gold standard that safeguards data, builds confidence and differentiates forward-looking practices from the rest. The following seven strategies, drawn from real-world experience in legal technology, outline actionable ways law firms can fortify their defenses while making security a pillar of client trust and firm reputation.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES