Account

Sign in to access your account and subscription

LJN Newsletters

  • No Duty to Maintain Bulkhead
    Self-Conveyance Did Not Sever Joint Tenancy
    Promissory Estoppel Not Available to Avoid Statute of Frauds
    Presumption of Hostility Sustains Prescriptive Easement Claim

    January 01, 2019ssalkin
  • Loft Tenant Subject to Rent Stabilization
    Video Surveillance a Substitute for Part-Time Lobby Attendants

    January 01, 2019ssalkin
  • 2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.

    January 01, 2019Leigh-Anne Galloway
  • For years, the U.S. has maintained an active enforcement campaign against overseas cyber criminals and while these past efforts have not been haphazard, they have not necessarily been part of a specific drive to address the serious issue of foreign cybercrime committed by nation states. Recent announcements by the DOJ show that this enforcement campaign is accelerating and expanding.

    January 01, 2019Ronald Cheng and Mallory Jensen
  • In 2017, Atlanta attorney Bess Hinson founded the Atlanta Women in Cybersecurity Roundtable, an invitation-only initiative to provide community and resources to advance women in cybersecurity in Atlanta. Here, we speak with some of those women leaders about their biggest security and privacy challenges and why women are pursing legal and other roles in the cybersecurity and privacy field.

    January 01, 2019Adam Schlagman
  • Defending your corporation from advanced cyber threats is a difficult and never-ending challenge. The attack surface of an organization is constantly adapting to meet the needs of a business and attack vectors are increasing nearly every few hours.

    January 01, 2019Tyler Young
  • The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.

    January 01, 2019Alastair Johnson