Features

Cloudy With a Chance of IoT attacks: The Cybersecurity Forecast for 2019
2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.
Features

What the U.S.' Pursuit of Foreign Nation-State Hackers Means for Cybercrime Victims and Targets
For years, the U.S. has maintained an active enforcement campaign against overseas cyber criminals and while these past efforts have not been haphazard, they have not necessarily been part of a specific drive to address the serious issue of foreign cybercrime committed by nation states. Recent announcements by the DOJ show that this enforcement campaign is accelerating and expanding.
Features

Q&A with Women Leaders in Cybersecurity and Privacy
In 2017, Atlanta attorney Bess Hinson founded the Atlanta Women in Cybersecurity Roundtable, an invitation-only initiative to provide community and resources to advance women in cybersecurity in Atlanta. Here, we speak with some of those women leaders about their biggest security and privacy challenges and why women are pursing legal and other roles in the cybersecurity and privacy field.
Features

Are Cybersecurity Solutions and Consulting a New Revenue Stream for Law Firms?
The Big 4 accounting firms have identified legal services as an area for growth beyond traditional financial services and consulting services.
Features

Detecting, Discovering, and Eliminating Threats
Defending your corporation from advanced cyber threats is a difficult and never-ending challenge. The attack surface of an organization is constantly adapting to meet the needs of a business and attack vectors are increasing nearly every few hours.
Features

Fighting Biometric Fraud on the Blockchain
The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
Features

Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say
For Years, Federal Legislators Have Attempted to Pass Comprehensive Cybersecurity and Data Privacy Legislation. With More Support Than Ever from the Public, Industry and Both Sides of the Political Spectrum, 2019 May Be the Year When Such Legislation Is Enacted.
Features

Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits
Being prepared for the worst before it even happens can minimize the damage in the event of a cybersecurity incident. To get any company ready for a cybersecurity event, the first step is to organize a team to write a mock breach notification letter that will represent your message to the world about your failure in the event you have a breach.
Features

Legal Tech: Moving to the Cloud for Business Continuity Planning
In the past year, the devastation caused by natural disasters has been immense. Law firms, like every other business, are left to deal with the aftermath of these catastrophic events. Firms that have established business continuity plans to put into effect when these instances occur will find themselves a step ahead in the disaster recovery process. And the ones leveraging cloud technology are at an even greater advantage.
Features

Sticking a Hand in the Internet Cookie Jar
Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- From the PTO to the FDA: What to Consider When Branding Clinical TrialsThe legal implications of branding generally arise initially for companies during the process of selecting a company name and any initial product or service names. For drug development companies, however, careful consideration should also be paid to the implications of branding a clinical trial.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›