Account

Sign in to access your account and subscription

Cybersecurity

  • Even though law firms don't generally manage retail-type websites, they are far from immune to cyber threats. In fact, firms are prime targets for cyber criminals.

    June 01, 2018Melanie Trudeau
  • Part Two of a Two-Part Article

    Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.

    June 01, 2018Jared Coseglia
  • With the corpus of law data becoming ever-more complex and nuanced, the use of machine-assisted research and analysis is becoming more of a requirement, rather than an option, in the legal profession. Because of this, some have expressed fear that robot-lawyers will replace legal professionals.

    June 01, 2018Jeff Reihl and Rick McFarland
  • A Q&A with Penn Law Prof. Anne Toomey McKenna

    The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.

    June 01, 2018Gabrielle Orum Hernández
  • Oft-Considered an Avenue for Individuals to Attain Greater Control over Their Digital Information, Blockchain Could Be Leveraged By Facebook to Change Its Status As “Gatekeeper” for User Data

    Facebook Inc. recently announced that it will begin exploring different ways to incorporate blockchain into its infrastructure. Yet, questions remain over how the social media company will implement the technology and what sort of legal challenges doing so could portend.

    June 01, 2018Ian Lopez
  • Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don't just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm's responsibility to ensure their vendors are managing risk appropriately.

    May 01, 2018Ishan Girdhar