Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

User Behavior Analytics and Your Company's Data Image

User Behavior Analytics and Your Company's Data

Jason Straight

While cybersecurity spending at many organizations still tends to focus on perimeter defenses, security experts have begun to face the reality that it is nearly impossible to keep bad actors out of your network, and are turning their attention to better ways of mitigating threats posed by intruders once they've hacked their way in.

Features

<b><i>Legal Tech</b></i><br>Making Sense of New Data Types in the App Age Image

<b><i>Legal Tech</b></i><br>Making Sense of New Data Types in the App Age

Tim Anderson & JR Jenkins

While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

Features

The GDPR Image

The GDPR

Ryan Costello

<b><i>Considerations for Corporate Counsel and Discovery Teams</b></i><p>With the EU's General Data Protection Regulation (GDPR) set to take effect in May 2018, the serious implications for corporate legal counsel and e-discovery teams are difficult to deny.

Features

<b><i>Online Extra</b></i><br>What Companies Can Demand From Law Firms on Data Security Image

<b><i>Online Extra</b></i><br>What Companies Can Demand From Law Firms on Data Security

C. Ryan Barber

Association of Corporate Counsel Releases First Set of Model Cybersecurity Practices

Features

Information Security: The Human Factor Image

Information Security: The Human Factor

Michael Kemps & Kimberly Pease

Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.

Features

<i><b>Online Extra</b></i><br> Are Law Departments Letting Law Firms Off the Hook When it Comes to Cybersecurity? Image

<i><b>Online Extra</b></i><br> Are Law Departments Letting Law Firms Off the Hook When it Comes to Cybersecurity?

Daniella Isaacson

It is time for a reality check on cybersecurity. Our research has focused on the threat that data breaches present to law firms and law departments independently, but the interplay between cybersecurity at law firms and law departments is increasingly impossible to ignore.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean B. Cooney

IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.

Features

A Primer for the Entertainment Industry on the Use of Blockchain Technology Image

A Primer for the Entertainment Industry on the Use of Blockchain Technology

Emile Loza de Siles

This article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems.

Features

Cybersecurity: Law Firms Are Coming Up Short Image

Cybersecurity: Law Firms Are Coming Up Short

Ricci Dipshan

An ALM Survey Reports Disturbing Information

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›