Account

Sign in to access your account and subscription

Cybersecurity

  • Uber has incurred significant legal and reputational exposure as a result of the way that the company handled the breach. In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.

    January 01, 2018Paige Boshell
  • A new legal structure that bestows and monitors trust must be employed. Is decentralization of traditional, gigantic central bank repositories of data the answer? Is blockchain technology the new path that the legal industry should take to sustain in the digital age? Let us consider the most significant implications of decentralized technologies to the legal industry.

    January 01, 2018Dmitry Dontsov
  • Part Two of a Two-Part Article

    The proliferation of cryptocurrency and blockchain is being driven by the efficiencies and protections afforded to early adopters. The operational efficiencies and resulting cost savings are readily apparent in the financial services industry and are equally coveted by the entities trying to implement them and by the customers who will benefit from the implementation. However, neither party can fully enjoy these benefits without first understanding and overcoming the various regulatory hurdles.

    January 01, 2018Craig Nazzaro, Brad Rustin and John Jennings
  • Cybersecurity is a hydra of complexity. Keeping a grasp on it requires constant re-education. What no one tells you: managing your company's cyber vulnerability demands a willingness for personal vulnerability. Being honest about our cyber risks is painful. And scary.

    January 01, 2018April Runft
  • At law firms and legal departments, preparing for the new year should mean looking back at the last year and prioritizing revenue-driving activities, identifying strategies to grow your firm or company while mitigating risk and budgeting for new projects to meet client demands.

    January 01, 2018Jeff Ton
  • In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident. It is meant to be a helpful guide, but the best response generally will depend on different factors, including the scope and severity of the attack, availability of remediation measures, and business sensitivities.

    January 01, 2018Kiran Raj and Mallory Jensen