High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
- March 01, 2017Sean B. Cooney
There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
February 01, 2017Sean CooneyThere are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
February 01, 2017Sean B. CooneyAs the chances of a data breach incident increase, savvy firms and businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.
February 01, 2017Rich Blumberg and Eric HodgeIT security professionals will tell you that the bulk of spending on cybersecurity in large organizations in recent years has been toward perimeter tools like firewalls. And yet the relentless pace of major data breaches has shown no signs of letting up.
February 01, 2017Jason StraightClose cooperation between the public and private sector is crucial, given the enormous risks associated with the continued acceleration of global connectedness. Upon closer inspection, however, significant cultural and legal barriers exist that can hinder further cooperation necessary to effectively combat the cyber theat.
February 01, 2017Justin S. Daniels and Joe D. WhitleyFor many of us, the term "data breach" conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats.
February 01, 2017Sam ChiAs 3-D Printing Becomes More Widespread, In-House Counsel Will Be Tasked with Complex IP and Liability Challenges
Yet another potentially disruptive technology is set to join the ranks of blockchain and AI as a headache for legal: 3-D printing. While its use in legal is limited, 3-D printing presents unique challenges to in-house counsel prosecuting or defending IP and liability issues.
February 01, 2017Ricci DipshanThe modern-day snoop is all too often someone you know. If this consideration doesn't leave you paranoid and looking over your shoulder, it should.
January 01, 2017Karen EllisGiven the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.
January 01, 2017Justin Hectus









