Features
Marketing Tech: How CMOs Can Use Retargeting to Attract New Business
Retargeting combines two of the most important aspects of digital marketing: automation and personalization. Marketers use retargeting to stay in front of the consumer across devices and to ultimately try to reach them at the right time — the moment of purchase intent.
Columns & Departments
IP News
Federal Circuit: IPR Petitioner Always Retains Burden of Establishing Timeliness<br>Federal Circuit: Framework for 'Overlapping Cases' Applies in IPR
Features
Third Circuit Affirms Reversal of $275M Break-Up Fee in Del. Bankruptcy Case
The U.S. Court of Appeals for the Third Circuit on Sept. 13 upheld a Delaware Bankruptcy Court's decision to block a Florida-based energy company from collecting a $275 million merger termination fee against the bankruptcy estates of Energy Future Holdings Corp. and a subsidiary.
Columns & Departments
In the Courts
Second Circuit Issues Ruling Against DOJ in <i>United States v. Hoskins</i> Appeal
Features
Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up
How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don't follow security protocols or are tricked into downloading malicious code.
Features
Retail Leads the Way in Data Breaches — Here's How to Protect Your Customers
If 2017 was considered the “year of the data breach” as the number of incidents hit a new record high of 1,579, 2018 might get even more serious. Just a little more than halfway through 2018, the number and scale of data breaches that have already been reported is staggering.
Features
Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions
Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.
Features
Law Firms: You Can't Buy Yourself Out Of Risk
A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).
Features
Securing Each Link in the e-Discovery Chain
Cloud service providers to the federal government must meet the rigorous requirements of the Federal Risk and Authorization Management Program. FedRAMP, as it's known, is designed to help federal agencies follow the government's “cloud first” policy, and includes detailed and strict encryption and other cybersecurity requirements.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Defending Your Career: Self Advocacy at Review TimeFirms have taken a hit due to COVID-19 and some will use this review cycle to pinpoint underperformers and reduce compensation. This is why it's even more important for you to make a case for yourself.Read More ›
