Features

Phishing for Whales with Spears
<b><i>What Your Organization Can Do to Protect Itself from Email-Based Attacks</b></i><p>There's no question that email has revolutionized the way we operate. Unfortunately, for all of its convenience, email has opened the door to serious security threats that include viruses, malware and fraud. Phishing scams have become a widespread problem — you'd be hard pressed to find anyone who hasn't been on the receiving end of a phishing attempt.
Features

Understanding the Intersection Between GDPR and Cybersecurity
It's been about half a year since Europe's General Data Protection Regulation (GDPR) was activated, and corporate legal, privacy and compliance teams are beginning to adjust to the new lay of the land. We've seen early examples of enforcement activity, and those are helping organizations better understand the long-term landscape for compliance.
Features

Unprepared for a Cyberattack? The DOJ Wants to Change That
<b><i>New U.S. Department of Justice Cybersecurity Guidelines Stress Preparedness Amid Reports That Many Organizations Have Failed to Plan for a Breach</b></i><p>Data protection tips are virtually everywhere these days. So it's hardly surprising that the U.S. Department of Justice has released new guidelines on that very topic. The UK's National Cyber Security Centre is poised to follow suit.
Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds
The advent of cryptocurrencies has raised a host of legal issues; some of the most immediate ones — such as whether cryptocurrencies are securities — appear to have been resolved, but cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year.
Features

Meritas' New Cybersecurity Standard Requirement Assures Legal Clients
Meritas, a nonprofit association of law firms, now requires its law firm members to follow a new cybersecurity standard. The reason for this new standard? Law firms' clients.
Features

The Blockchain Will Support GDPR, but Not How Most People Think
It's clear that the onset of GDPR regulations and a quickly changing consumer sentiment about the sensitivity and value of their personal data will reorient a company's interactions with their customers and their information. There will be some pain points in this transition, as Facebook investors recently demonstrated, but it doesn't have to be a unilateral downturn for the tech industry.
Features

Online Extra: Severity of Data Breaches Increases In First Half of 2018
Gemalto's 2018 Breach Level Index found 4.5 billion records were stolen, lost or compromised worldwide in the first half of 2018, a 133 increase over the first half of 2017.
Features

Cybersecurity for Government: Lessons from the Front Line
During the time it takes you to read this article, somewhere in the United States, a governmental entity will probably be the victim of a cyber-attack. This article highlights the areas that are most impactful, based on experience in dealing with both large and small cyber-attacks against governments and governmental entities.
Features

Update on UK Sanctions, Anti-Money Laundering and Brexit
This article provides a brief education about where things currently stand in the UK as regards to sanctions and anti-money laundering in the shifting sands of the Brexit process.
Features

Cybersecurity and Email
In the legal community, professionals have embraced email. However, as increasing concerns and regulations around data security continue to evolve, the future of digital communication via email may not meet the more stringent requirements.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›