Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Podcast: Phishing Image

Podcast: Phishing

Jason Thomas

Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.

Features

What Lies Beneath the Surface: The Dark Web Image

What Lies Beneath the Surface: The Dark Web

Elizabeth Vandesteeg & Jeffrey Goldberg

This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.

Features

When Products Start Teaching Cybersecurity Process Image

When Products Start Teaching Cybersecurity Process

Jared Coseglia

<b><i>New Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large</b></i><p>Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.

Features

The Dark Web Image

The Dark Web

Elizabeth Vandesteeg & Jeffrey Goldberg

The goals of this article are: 1) to provide a basic outline of the structure of the Web and to provide some insight into the purpose for and content housed on each level; and 2) to give some practical tips on preventing your company's data from ending up on the Dark Web.

Features

<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles Image

<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles

Zach Warren

<b><i>The Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age</b></i><p>Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.

Features

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies Image

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies

Robert J. Anello & Christina Lee

As the adoption of cryptocurrencies spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations mean greater scrutiny than ever before.

Features

Cybersecurity in Commercial Equipment Leases Image

Cybersecurity in Commercial Equipment Leases

Michelle Schaap, Frank Peretore & Robert Hornby

<b><i>Hidden Liability for the Unwary Lessor</i></b><p>Much has been written in the industry about equipment lessors' cybersecurity practices for the protection of their information. The issue addressed herein is the equipment lessor's obligations and potential liability for information stored on equipment returned to the lessor at the end of a lease.

Features

<i>Legal Tech</i><br> What Microsoft's Recent Office 365 and Security Updates Mean for Legal Image

<i>Legal Tech</i><br> What Microsoft's Recent Office 365 and Security Updates Mean for Legal

Rhys Dipshan

<b><i>From New Reporting Functionality to Cross-Application Tagging and Security Features, the New Updates Aim to Round Out Office 365's Information Governance and Cybersecurity Features</b></i><p>In a bid to appeal to legal professionals, Microsoft has updated Office 365 with information governance, security, and e-discovery capabilities, and encouraged legal technology integration with its platform.

Features

Cyber Disaster Recovery Image

Cyber Disaster Recovery

Jeff Ton

<b><i>How to Take a Law Firm Beyond Insurance</i></b><p>With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies.

Features

3D Printing, Sharing Economy, and Other Emerging Industries Image

3D Printing, Sharing Economy, and Other Emerging Industries

Michael S. Levine & Andrea L. DeField

<b><i>Do You Have Adequate Coverage?</b></i><p>Most traditional or "legacy" insurance products fail to provide sufficient coverage for certain risk exposures vis-à-vis the 3D printing industry, just as they fail to adequately protect businesses in other emerging industries that, along with their concomitant risks, simply did not exist when the legacy insurance products covering them were formulated.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES