Features

Ransomware in Review: 8 Prevention and Response Tips for Your Organization
Electronic data is defining the business world, and with its benefits come many threats. Here's how experts think organizations should protect against ransomware.
Features

<i><b>Legal Tech</b></i><br> Five Ways Legal and Compliance Teams Can Benefit from Office 365 Migration
Legal and compliance groups have a lot to gain from features within Office 365, and equal or greater risk if the process is not conducted in the context of strong legal and regulatory guidelines.
Features

<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm
The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.
Features

<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm
The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.
Features

<b><i>BREAKING NEWS</b></i><br>Anthem Agrees to Record $115M Data Breach Settlement
Anthem Inc. has agreed to pay $115 million to settle claims related to the massive 2015 cyberattack that affected 78.8 million customers. If approved by U.S. District Judge Lucy Koh of the Northern District of California, the deal would be the largest data breach settlement in history.
Features

Layered Federal and State Cybersecurity Regulation of Financial Services Firms
Cybercrime poses an ever-increasing threat to consumers of financial products and services. In 2016, the then- SEC Chair said that cybercrime ranks as “one of the greatest risks facing the financial services industry.” Federal law thus requires financial services firms to implement procedures designed to protect their customers' data. Now individual states are increasingly getting into the game.
Features

New Research: Employee Privacy and Corporate Legal Risk
The use of business email accounts and digital devices for personal communications can be risky for both employers and employees. However, employees of all levels may be commingling corporate communications with their personal information, according to new research.
Features

Will Ransomware Attack Make Law Firms 'WannaCry'?
Employees the world over were locked out of their computers on May 12 and over that following weekend as an insidious and widespread cyberattack nicknamed "WannaCry" rolled through the Internet and into headlines. Luckily for U.S. law firms, experts said it was unlikely that this particular ransomware attack hit many of them. However, they fear aftershocks.
Features

State of the Industry: E-Discovery and Cybersecurity
<b><i>The Future State of the E-Discovery Job Market Will Be Cloud and Contract Staffing</b></i><p><b><i>Part Three of a Three-Part Article</b></i><p>If the history of e-discovery is the future of cybersecurity, then what should one expect for the future of e-discovery? How long will the current period of consolidation continue? What will be the next chapter in e-discovery's never-ending reinvention? How closely will the next 10 years of cybersecurity job trends mirror e-discovery's past?
Features

Ransomware: The Good, the Bad and the Ugly
Ransomware has quickly emerged as a billion dollar industry and shows no sign of slowing down. So why is ransomware the ubiquitous nuisance it is? Simple: It works. Over 70% of companies pay the ransom.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Clause & EffectNet-Profit Rights/Movies Based on TV Shows<br>Insurance/Contract-Breach Exclusion<br>Insurance/Copyright-Infringement CoverageRead More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›
- Foreseeability as a Bar to Proof of Patent InfringementThe doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale — especially since it included a new and controversial foreseeability test in its analysis for estoppel.Read More ›