Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,291 results for "Cybersecurity Law & Strategy"...

Q&A with Women Leaders in Cybersecurity and Privacy
January 01, 2019
In 2017, Atlanta attorney Bess Hinson founded the Atlanta Women in Cybersecurity Roundtable, an invitation-only initiative to provide community and resources to advance women in cybersecurity in Atlanta. Here, we speak with some of those women leaders about their biggest security and privacy challenges and why women are pursing legal and other roles in the cybersecurity and privacy field.
Are Cybersecurity Solutions and Consulting a New Revenue Stream for Law Firms?
January 01, 2019
The Big 4 accounting firms have identified legal services as an area for growth beyond traditional financial services and consulting services.
Detecting, Discovering, and Eliminating Threats
January 01, 2019
Defending your corporation from advanced cyber threats is a difficult and never-ending challenge. The attack surface of an organization is constantly adapting to meet the needs of a business and attack vectors are increasing nearly every few hours.
Fighting Biometric Fraud on the Blockchain
January 01, 2019
The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say
January 01, 2019
For Years, Federal Legislators Have Attempted to Pass Comprehensive Cybersecurity and Data Privacy Legislation. With More Support Than Ever from the Public, Industry and Both Sides of the Political Spectrum, 2019 May Be the Year When Such Legislation Is Enacted.
Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits
January 01, 2019
Being prepared for the worst before it even happens can minimize the damage in the event of a cybersecurity incident. To get any company ready for a cybersecurity event, the first step is to organize a team to write a mock breach notification letter that will represent your message to the world about your failure in the event you have a breach.
Legal Tech: Moving to the Cloud for Business Continuity Planning
January 01, 2019
In the past year, the devastation caused by natural disasters has been immense. Law firms, like every other business, are left to deal with the aftermath of these catastrophic events. Firms that have established business continuity plans to put into effect when these instances occur will find themselves a step ahead in the disaster recovery process. And the ones leveraging cloud technology are at an even greater advantage.
Risks in Online Collection of Children's Data
January 01, 2019
As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some pose security risks and privacy risk, like those present in voice-activated devices — especially for children. For manufacturers, they also pose regulatory litigation and insurance risks, especially when children end up using their “smart” products.
Big Law's Trojan Horse: Are the Big Four Preparing an Invasion?
January 01, 2019
<b><i>Law Firms Partner With the Big Four to Serve Their Clients, But the Accountants Pose an Existential Threat. What Will Happen If — or When — They Turn Competitive?</b></i><p>For law firm leaders, rank-and-file partners and everyone else in the law firm ecosystem, the Big Four shouldn't be a laughing matter. They are serious about selling legal services, and clients are listening.
Sticking a Hand in the Internet Cookie Jar
December 01, 2018
Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.

MOST POPULAR STORIES

  • Surveys in Patent Infringement Litigation: The Next Frontier
    Most experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.
    Read More ›
  • A Playbook for Disrupting Traditional CRM
    Here's the playbook for disruption: Take attorneys out of the equation. Stop building CRM that succeeds or fails on their shoulders. We need to shift the focus and, instead, build the technology from the ground up for the professionals who actually use it: marketing and business development.
    Read More ›