Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds Image

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds

Chris Ott

The advent of cryptocurrencies has raised a host of legal issues; some of the most immediate ones — such as whether cryptocurrencies are securities — appear to have been resolved, but cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year.

Features

Meritas' New Cybersecurity Standard Requirement Assures Legal Clients Image

Meritas' New Cybersecurity Standard Requirement Assures Legal Clients

Victoria Hudgins

Meritas, a nonprofit association of law firms, now requires its law firm members to follow a new cybersecurity standard. The reason for this new standard? Law firms' clients.

Features

The Blockchain Will Support GDPR, but Not How Most People Think Image

The Blockchain Will Support GDPR, but Not How Most People Think

Michael Smolenski

It's clear that the onset of GDPR regulations and a quickly changing consumer sentiment about the sensitivity and value of their personal data will reorient a company's interactions with their customers and their information. There will be some pain points in this transition, as Facebook investors recently demonstrated, but it doesn't have to be a unilateral downturn for the tech industry.

Features

Online Extra: Severity of Data Breaches Increases In First Half of 2018 Image

Online Extra: Severity of Data Breaches Increases In First Half of 2018

Zach Warren

Gemalto's 2018 Breach Level Index found 4.5 billion records were stolen, lost or compromised worldwide in the first half of 2018, a 133 increase over the first half of 2017.

Features

Cybersecurity for Government: Lessons from the Front Line Image

Cybersecurity for Government: Lessons from the Front Line

Roy E. Hadley, Jr.

During the time it takes you to read this article, somewhere in the United States, a governmental entity will probably be the victim of a cyber-attack. This article highlights the areas that are most impactful, based on experience in dealing with both large and small cyber-attacks against governments and governmental entities.

Features

Update on UK Sanctions, Anti-Money Laundering and Brexit Image

Update on UK Sanctions, Anti-Money Laundering and Brexit

André Bywater & Jonathan Armstrong

This article provides a brief education about where things currently stand in the UK as regards to sanctions and anti-money laundering in the shifting sands of the Brexit process.

Features

Cybersecurity and Email Image

Cybersecurity and Email

Bill Ho

In the legal community, professionals have embraced email. However, as increasing concerns and regulations around data security continue to evolve, the future of digital communication via email may not meet the more stringent requirements.

Features

Fighting Biometric Fraud on the Blockchain Image

Fighting Biometric Fraud on the Blockchain

Alastair Johnson

The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.

Features

Law Firms: You Can't Buy Yourself Out of Risk Image

Law Firms: You Can't Buy Yourself Out of Risk

Mark Sangster

A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).

Features

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up Image

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up

Brian Lapidus & Keith Wojcieszek

How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don't follow security protocols or are tricked into downloading malicious code.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›
  • Holders of Unredeemed Gift Cards Denied Bankpruptcy Priority
    For some time now, the brick and mortar side of the retail industry has been in financial distress. In 2015 and 2016 alone, brand-name ­companies such as Sports Authority, RadioShack, Aéropostale, American Apparel, Eastern Mountain Sports and City Sports sought bankruptcy protection. A common question in these cases is how to treat holders of unredeemed gift cards. Are they near the back of the line with other general unsecured creditors, or are they entitled to “priority” payment status under the Bankruptcy Code?
    Read More ›