Features

Information Governance: Law Firms' Cybersecurity Weak Spot
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
Features

Survey Reflects Growth in How Corporations Manage and Protect Information
Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.
Features

Information Security: The Human Factor
Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.
Features

New York State's Financial Services Cybersecurity Regulation
The Regulation was designed to promote the protection of customer information as well as the underlying information technology systems of regulated entities in light of the ever-increasing threat of cyber attacks.
Features

Is Your Data Breach Response Plan Good Enough? Stress Test It
As the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.
Features

Culture of Collaboration
<b><i>Optimal Insights Through Inter-Departmental Initiatives</b></i><p><p>As dizzying amounts of resources and the need for the timeliest insights grow, the conduit and collaboration between business development and an organization's information management department, especially, becomes more critical than ever.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- CLE Shouldn't Be the Only Mandatory Training for AttorneysEach stage of an attorney's career offers opportunities for a curriculum that addresses both the individual's and the firm's need to drive success.Read More ›
- Discovery of Claim Construction and Infringement Analysis May be Compelled Prior to a Markman HearingA defendant in a patent infringement suit may, during discovery and prior to a <i>Markman</i> hearing, compel the plaintiff to produce claim charts, claim constructions, and element-by-element infringement analyses.Read More ›
- AI's Growing Impact On the Gaming IndustryThe gaming and wagering sector has begun to cross paths with artificial intelligence technology in ways both predictable and unforeseen. As with other industries, AI technology inevitably has found its way into various components of the gaming experience. What is striking, however, is how AI is revolutionizing gaming for operators, regulators, suppliers and patrons alike.Read More ›
- DOJ and States Open Antitrust Case Against Google for Monopolizing Internet Search MarketThe U.S. Department of Justice and dozens of states opened their antitrust case against Google in Washington last month, accusing the tech giant of illegally monopolizing the internet search and related ad markets.Read More ›
- <b><i>Online Extra</b></i><br> Law Firms, Legal Departments Predicted to Focus More on IT RiskOverall global spending in the information security services and products sector will total $86.4 billion this year, an increase of 7% over last year.Read More ›