Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Cyber Spies: In-House Legal Fights Back Against Cyberespionage Image

Cyber Spies: In-House Legal Fights Back Against Cyberespionage

Ricci Dipshan

<b><i>An Exploration of the Modern Cyberespionage Threat and How In-House Legal Departments Are Fighting Back</b></i><p>Though faced with limited legal remedies, counsel are coming up with creative new ways to go after cyberespionage actors, and partnering with an array of cyber professionals and government agencies to combat the threat.

Features

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics Image

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics

Jerry Cohen

Legal departments for business organizations rate cybersecurity, regulation and ethics compliance among their chief concerns, and they are well aware of surveys showing law firms to be the "soft underbelly" of business security due to weakness of their cybersecurity.

Features

Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font> Image

Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font>

Sam Chi

The more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider (employee) threats. Insider threats can be malicious, but often they are accidental.

Features

<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law? Image

<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law?

Zach Warren

<b><i>A Consilio Survey Found 75% of Legal Tech Professionals Are Unfamiliar with the Law, But Multinational Companies Can Still Prepare Before the June Implementation</b></i><p>In December 2016, China passed a comprehensive Cybersecurity Law, expanding the country's data localization requirement once it goes into effect this June and sparking heated debate among Chinese lawmakers. Some experts say even more legislation could be on the way.

Features

Client Data in the Age of Digital Technologies and Cyber Warfare Image

Client Data in the Age of Digital Technologies and Cyber Warfare

Tinamarie Feil

Ubiquitous news of law firm data breaches, even among BigLaw, spotlights a treasure trove of trade secrets, confidential and strategic transactions, and sensitive client information. No wonder law firms are perceived to be attractive targets of cyber-attacks. Attractive? You can't help that. Easy? Not so fast.

Features

<i>BREAKING NEWS</i><br>Yahoo General Counsel Ron Bell Resigns Amid Data Breach Controversy Image

<i>BREAKING NEWS</i><br>Yahoo General Counsel Ron Bell Resigns Amid Data Breach Controversy

Jennifer Williams-Alvarez

Yahoo Inc. announced on March 1 that general counsel Ron Bell is leaving the tech giant after an investigation of the company revealed that its legal team failed to sufficiently inquire into a massive 2014 cybersecurity breach.

Features

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font> Image

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>

Sean B. Cooney

High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean Cooney

There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean B. Cooney

There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Is Your Data Breach Response Plan Good Enough? Stress Test It! Image

Is Your Data Breach Response Plan Good Enough? Stress Test It!

Rich Blumberg & Eric Hodge

As the chances of a data breach incident increase, savvy firms and businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Meet the Lawyer Working on Inclusion Rider Language
    At the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers &amp; Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.
    Read More ›
  • Law Firms and the Rise of Hospitality
    The law firm office cannot remain unchanged, as if frozen in time set to some date prior to the onset of pandemic, when the terms and meaning have all changed. In fact, the office must now provide benefits or an experience the lawyers and staff cannot get at home.
    Read More ›
  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›