This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What is different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.
- October 02, 2017F. Paul Greene
With 143 million people potentially hit by Equifax Inc.'s data breach, there's no doubt there will lawsuits — a lot of them."You'll have suits in…
October 02, 2017Amanda BronstadEven the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.
October 02, 2017Ed SilversteinHackers have turned to a new information-rich source: employee benefit plans. This article examines the threat facing benefit plans, explores the applicable legal landscape, and recommends steps to better equip plans to prepare for and manage data breaches.
October 02, 2017Robert M. Projansky and Miriam S. DubinThough traditionally considered laggards when adopting new technology, law firms have recently started to explore new tricks to fortify performance across their organizations. While this evolution is critical to a firm's survival, it's important that firm administrators understand that substantive improvements are only possible through multi-directional change.
October 02, 2017Zachary Beauchemin and Alisha DiGiandomenicoRecent attacks may not yet have resulted in damages or disruption, but the group appears to be positioning itself to learn how the targeted energy facilities operate while attempting to gain access to operational control systems, if they have not done so already.
October 01, 2017Michael Bahar, Trevor Satnick and Mark ThibodeauxIn an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.
September 02, 2017Chuck Kunz and Ian McCauleyHow to Protect Your Firm from Vendor Risks
The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.
September 02, 2017Mark SangsterNext in a series of podcasts looking at the cybersecurity and tech world.
September 02, 2017Jason ThomasAnalyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data.
September 02, 2017Julian Sheppard and Michele C.S. Lange










