Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law? Image

<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law?

Zach Warren

<b><i>A Consilio Survey Found 75% of Legal Tech Professionals Are Unfamiliar with the Law, But Multinational Companies Can Still Prepare Before the June Implementation</b></i><p>In December 2016, China passed a comprehensive Cybersecurity Law, expanding the country's data localization requirement once it goes into effect this June and sparking heated debate among Chinese lawmakers. Some experts say even more legislation could be on the way.

Features

Client Data in the Age of Digital Technologies and Cyber Warfare Image

Client Data in the Age of Digital Technologies and Cyber Warfare

Tinamarie Feil

Ubiquitous news of law firm data breaches, even among BigLaw, spotlights a treasure trove of trade secrets, confidential and strategic transactions, and sensitive client information. No wonder law firms are perceived to be attractive targets of cyber-attacks. Attractive? You can't help that. Easy? Not so fast.

Features

<i>BREAKING NEWS</i><br>Yahoo General Counsel Ron Bell Resigns Amid Data Breach Controversy Image

<i>BREAKING NEWS</i><br>Yahoo General Counsel Ron Bell Resigns Amid Data Breach Controversy

Jennifer Williams-Alvarez

Yahoo Inc. announced on March 1 that general counsel Ron Bell is leaving the tech giant after an investigation of the company revealed that its legal team failed to sufficiently inquire into a massive 2014 cybersecurity breach.

Features

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font> Image

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>

Sean B. Cooney

High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean Cooney

There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean B. Cooney

There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Is Your Data Breach Response Plan Good Enough? Stress Test It! Image

Is Your Data Breach Response Plan Good Enough? Stress Test It!

Rich Blumberg & Eric Hodge

As the chances of a data breach incident increase, savvy firms and businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.

Features

Can User Behavior Analytics Do a Better Job of Protecting Your Organization's Data? Image

Can User Behavior Analytics Do a Better Job of Protecting Your Organization's Data?

Jason Straight

IT security professionals will tell you that the bulk of spending on cybersecurity in large organizations in recent years has been toward perimeter tools like firewalls. And yet the relentless pace of major data breaches has shown no signs of letting up.

Features

Cybersecurity Public Private Partnerships: Challenges and Opportunities Image

Cybersecurity Public Private Partnerships: Challenges and Opportunities

Justin S. Daniels & Joe D. Whitley

Close cooperation between the public and private sector is crucial, given the enormous risks associated with the continued acceleration of global connectedness. Upon closer inspection, however, significant cultural and legal barriers exist that can hinder further cooperation necessary to effectively combat the cyber theat.

Features

Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines Image

Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines

Sam Chi

For many of us, the term "data breach" conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›
  • The Roadmap of Litigation Analytics
    Litigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.
    Read More ›