Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Phishing for Whales with Spears Image

Phishing for Whales with Spears

Eli Nussbaum

<b><i>What Your Organization Can Do to Protect Itself from Email-Based Attacks</b></i><p>There's no question that email has revolutionized the way we operate. Unfortunately, for all of its convenience, email has opened the door to serious security threats that include viruses, malware and fraud. Phishing scams have become a widespread problem — you'd be hard pressed to find anyone who hasn't been on the receiving end of a phishing attempt.

Features

Understanding the Intersection Between GDPR and Cybersecurity Image

Understanding the Intersection Between GDPR and Cybersecurity

Jake Frazier & Anthony J. Ferrante

It's been about half a year since Europe's General Data Protection Regulation (GDPR) was activated, and corporate legal, privacy and compliance teams are beginning to adjust to the new lay of the land. We've seen early examples of enforcement activity, and those are helping organizations better understand the long-term landscape for compliance.

Features

Unprepared for a Cyberattack? The DOJ Wants to Change That Image

Unprepared for a Cyberattack? The DOJ Wants to Change That

Phillip Bantz

<b><i>New U.S. Department of Justice Cybersecurity Guidelines Stress Preparedness Amid Reports That Many Organizations Have Failed to Plan for a Breach</b></i><p>Data protection tips are virtually everywhere these days. So it's hardly surprising that the U.S. Department of Justice has released new guidelines on that very topic. The UK's National Cyber Security Centre is poised to follow suit.

Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds Image

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds

Chris Ott

The advent of cryptocurrencies has raised a host of legal issues; some of the most immediate ones — such as whether cryptocurrencies are securities — appear to have been resolved, but cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year.

Features

Meritas' New Cybersecurity Standard Requirement Assures Legal Clients Image

Meritas' New Cybersecurity Standard Requirement Assures Legal Clients

Victoria Hudgins

Meritas, a nonprofit association of law firms, now requires its law firm members to follow a new cybersecurity standard. The reason for this new standard? Law firms' clients.

Features

The Blockchain Will Support GDPR, but Not How Most People Think Image

The Blockchain Will Support GDPR, but Not How Most People Think

Michael Smolenski

It's clear that the onset of GDPR regulations and a quickly changing consumer sentiment about the sensitivity and value of their personal data will reorient a company's interactions with their customers and their information. There will be some pain points in this transition, as Facebook investors recently demonstrated, but it doesn't have to be a unilateral downturn for the tech industry.

Features

Online Extra: Severity of Data Breaches Increases In First Half of 2018 Image

Online Extra: Severity of Data Breaches Increases In First Half of 2018

Zach Warren

Gemalto's 2018 Breach Level Index found 4.5 billion records were stolen, lost or compromised worldwide in the first half of 2018, a 133 increase over the first half of 2017.

Features

Cybersecurity for Government: Lessons from the Front Line Image

Cybersecurity for Government: Lessons from the Front Line

Roy E. Hadley, Jr.

During the time it takes you to read this article, somewhere in the United States, a governmental entity will probably be the victim of a cyber-attack. This article highlights the areas that are most impactful, based on experience in dealing with both large and small cyber-attacks against governments and governmental entities.

Features

Update on UK Sanctions, Anti-Money Laundering and Brexit Image

Update on UK Sanctions, Anti-Money Laundering and Brexit

André Bywater & Jonathan Armstrong

This article provides a brief education about where things currently stand in the UK as regards to sanctions and anti-money laundering in the shifting sands of the Brexit process.

Features

Cybersecurity and Email Image

Cybersecurity and Email

Bill Ho

In the legal community, professionals have embraced email. However, as increasing concerns and regulations around data security continue to evolve, the future of digital communication via email may not meet the more stringent requirements.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›