Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Legal Tech: Cloud and Security Considerations for e-Discovery Image

Legal Tech: Cloud and Security Considerations for e-Discovery

Stephen Ehrlich

E-discovery presents some special considerations that need to be examined before deciding what is best for your organization and really taking a stand in the on-premises vs. cloud debate.

Features

Legal Tech: Cases Highlighting Judicial Discretion in Ordering E-Discovery Sanctions Image

Legal Tech: Cases Highlighting Judicial Discretion in Ordering E-Discovery Sanctions

Mike Hamilton

Three cases from the summer of 2018 reinforce some of the key themes of recent e-discovery case law

Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds  Image

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds 

Chris Ott

Cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year. These cutting-edge problems intersect in interesting ways with companies' existing fraud and anti-money laundering concerns, but it all starts with the cryptocurrency "wallet."

Features

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise Image

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise

Phillip Bantz

The U.S. and China are in the midst of an escalating trade war and the DOJ has been prosecuting trade misappropriation cases against China with notable vigor as of late.

Features

Elections: The Hidden Security Danger for Governments Image

Elections: The Hidden Security Danger for Governments

Roy E. Hadley, Jr.

The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. It is incumbent upon the state and local governments to ensure the security of all elections.

Features

Why Do Cybersecurity Programs Fail? Image

Why Do Cybersecurity Programs Fail?

Chris Moschovitis

It seems this should be a key question for everyone in business, government, technology, and cybersecurity: If we know the problem with cybersecurity, and have ways of methods of addressing the problem, why are we still failing?

Features

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments Image

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments

Chris Maguire

A survey of more than 460 attorneys and decision makers working in corporate legal departments nationwide found that in-house teams, already stretched by limited resources, are confronting new and traditional challenges. Cybersecurity ranked among legal departments' biggest concerns for 2018.

Features

Phishing for Whales with Spears Image

Phishing for Whales with Spears

Eli Nussbaum

<b><i>What Your Organization Can Do to Protect Itself from Email-Based Attacks</b></i><p>There's no question that email has revolutionized the way we operate. Unfortunately, for all of its convenience, email has opened the door to serious security threats that include viruses, malware and fraud. Phishing scams have become a widespread problem — you'd be hard pressed to find anyone who hasn't been on the receiving end of a phishing attempt.

Features

Understanding the Intersection Between GDPR and Cybersecurity Image

Understanding the Intersection Between GDPR and Cybersecurity

Jake Frazier & Anthony J. Ferrante

It's been about half a year since Europe's General Data Protection Regulation (GDPR) was activated, and corporate legal, privacy and compliance teams are beginning to adjust to the new lay of the land. We've seen early examples of enforcement activity, and those are helping organizations better understand the long-term landscape for compliance.

Features

Unprepared for a Cyberattack? The DOJ Wants to Change That Image

Unprepared for a Cyberattack? The DOJ Wants to Change That

Phillip Bantz

<b><i>New U.S. Department of Justice Cybersecurity Guidelines Stress Preparedness Amid Reports That Many Organizations Have Failed to Plan for a Breach</b></i><p>Data protection tips are virtually everywhere these days. So it's hardly surprising that the U.S. Department of Justice has released new guidelines on that very topic. The UK's National Cyber Security Centre is poised to follow suit.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›
  • Holders of Unredeemed Gift Cards Denied Bankpruptcy Priority
    For some time now, the brick and mortar side of the retail industry has been in financial distress. In 2015 and 2016 alone, brand-name ­companies such as Sports Authority, RadioShack, Aéropostale, American Apparel, Eastern Mountain Sports and City Sports sought bankruptcy protection. A common question in these cases is how to treat holders of unredeemed gift cards. Are they near the back of the line with other general unsecured creditors, or are they entitled to “priority” payment status under the Bankruptcy Code?
    Read More ›