Features
Cyber Disaster Recovery
<b><i>How to Take a Law Firm Beyond Insurance</i></b><p>With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies.
Features
3D Printing, Sharing Economy, and Other Emerging Industries
<b><i>Do You Have Adequate Coverage?</b></i><p>Most traditional or "legacy" insurance products fail to provide sufficient coverage for certain risk exposures vis-à-vis the 3D printing industry, just as they fail to adequately protect businesses in other emerging industries that, along with their concomitant risks, simply did not exist when the legacy insurance products covering them were formulated.
Features
Data Security and Data Breach Response Continue to Be a Hot Issue
<b><i>Lessons from 2017 Enforcement Actions and Guidance</b></i><p>Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.
Features
Security First Approach Provides a Significant Advantage to Law Firms
The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.
Features
Equifax Breach Will Fuel Identity Theft Remediation Debate
In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.
Features
Bitcoin Is Fueling the Ransomware Epidemic
Money is a powerful motivator, but it alone wasn't enough to fuel the ransomware epidemic. After all, the first documented ransomware infection was in 1989, but it remained relatively unknown until its resurgence over the past five years. So what changed? In short, bitcoin.
Features
The Myth of the Secure Cloud
“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
Features
DRaaS: How It Takes a Law Firm's DR Beyond Insurance
With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.
Features
Procedures for Protecting Entertainment Domain Names Against Cybersquatters
Because there are so many new digital channels for possible intellectual property infringement, knowledge of the various mechanisms available to combat the issue is vital to enabling entertainment industry owners to protect their brand.
Features
The Equifax Breach: Why This One Is Different
This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
