While cybersecurity spending at many organizations still tends to focus on perimeter defenses, security experts have begun to face the reality that it is nearly impossible to keep bad actors out of your network, and are turning their attention to better ways of mitigating threats posed by intruders once they've hacked their way in.
- April 02, 2017Jason Straight
While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.
April 02, 2017Tim Anderson and JR JenkinsConsiderations for Corporate Counsel and Discovery Teams
With the EU's General Data Protection Regulation (GDPR) set to take effect in May 2018, the serious implications for corporate legal counsel and e-discovery teams are difficult to deny.
April 02, 2017Ryan CostelloAssociation of Corporate Counsel Releases First Set of Model Cybersecurity Practices
April 02, 2017C. Ryan BarberLaw firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.
April 02, 2017Michael Kemps and Kimberly PeaseIt is time for a reality check on cybersecurity. Our research has focused on the threat that data breaches present to law firms and law departments independently, but the interplay between cybersecurity at law firms and law departments is increasingly impossible to ignore.
April 02, 2017Daniella IsaacsonIT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.
April 02, 2017Sean B. CooneyThis article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems.
April 01, 2017Emile Loza de SilesThe Updates are the First Released Since 2007
March 30, 2017Zack WarrenAn ALM Survey Reports Disturbing Information
March 02, 2017Ricci Dipshan










