Account

Sign in to access your account and subscription

Cybersecurity

  • A Consilio Survey Found 75% of Legal Tech Professionals Are Unfamiliar with the Law, But Multinational Companies Can Still Prepare Before the June Implementation

    In December 2016, China passed a comprehensive Cybersecurity Law, expanding the country's data localization requirement once it goes into effect this June and sparking heated debate among Chinese lawmakers. Some experts say even more legislation could be on the way.

    March 02, 2017Zach Warren
  • Ubiquitous news of law firm data breaches, even among BigLaw, spotlights a treasure trove of trade secrets, confidential and strategic transactions, and sensitive client information. No wonder law firms are perceived to be attractive targets of cyber-attacks. Attractive? You can't help that. Easy? Not so fast.

    March 02, 2017Tinamarie Feil
  • High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

    March 01, 2017Sean B. Cooney
  • There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

    February 01, 2017Sean Cooney
  • There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

    February 01, 2017Sean B. Cooney
  • As the chances of a data breach incident increase, savvy firms and businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.

    February 01, 2017Rich Blumberg and Eric Hodge
  • Close cooperation between the public and private sector is crucial, given the enormous risks associated with the continued acceleration of global connectedness. Upon closer inspection, however, significant cultural and legal barriers exist that can hinder further cooperation necessary to effectively combat the cyber theat.

    February 01, 2017Justin S. Daniels and Joe D. Whitley