Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Law Firms' Pressing AI Questions
April 01, 2024
Most of the legal industry has by now boarded the generative artificial intelligence train, filling up conference sessions dedicated to the topic, testing new legal technology solutions and exploring the emerging legal questions that the technology will pose. But most of their questions about generative AI are still unanswered.
AI Needs Its 'Come to Jesus' Moment
March 01, 2024
It's time to stop the hype, stop talking up AI as if it's the next best thing since sliced bread and prove that it's a useful tool and technology that can actually be used in the actual practice of law.
U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements
March 01, 2024
The assessment and audit requirements of the new generation of state data protection laws will force U.S. companies to move beyond mere window dressing and instead require them to develop fulsome data protection programs.
Decoding DOJ's New 'Justice AI' Initiative
March 01, 2024
The DOJ is likely to face many practical challenges and novel issues as it begins coding its own algorithm for AI-related enforcement. This article briefly examines three areas of AI-related enforcement where such practical challenges and novel issues may arise.
Artificial Intelligence Redefines Our Defense Against Cyber Threats
March 01, 2024
The cybersecurity landscape is on the brink of a transformative shift, with predictive analytics and behavioral analysis leading the charge for more resilient and adaptive defenses.
Deep Fake of CFO on Videocall Used to Defraud Company of $25M
March 01, 2024
Hackers are using AI to sift large digital data to identify more convincing approaches for their scams as well as weaknesses in weaknesses in software coding or network security.
5 Expert Cybersecurity Steps to Take in 2024
March 01, 2024
As many CISOs and cyber teams think about the year ahead, and legal professionals consider the far-reaching consequences of cybersecurity, here is a checklist to help them prepare for the biggest cybersecurity trends to come.
New Jersey Passes Privacy Law
March 01, 2024
The New Jersey law follows states, such as California, Texas, and Connecticut, who have enacted privacy laws, including broad laws addressing consumer data privacy, children's privacy laws, consumer health data privacy laws, and data broker laws.
How Current and Future Leaders in Legal are Adapting Their Communication Styles
March 01, 2024
Ari Kaplan speaks with Andrew J. Sherman, a partner with Brown Rudnick, and Ross Guberman, the founder and CEO of LawCatch and the developer of BriefCatch, a software platform designed to elevate legal writing.
Pennsylvania Court Hit With Cyberattack, But It Had a Plan
March 01, 2024
Law firms have information that hackers want — Social Security numbers, financial data, personally identifiable information and more. It is therefore essential that firms plan for a possible breach. And when the breach occurs, have a plan.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" Bribery
    Although the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.
    Read More ›