Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
From server-filled data centers dotting the countryside to the phones in our pockets (not to mention those in our cars, homes and offices), computers are almost everywhere. In the course of extending this digital realm in which we work and play to business and industry, our most intimate and confidential data has been widely digitized, monetized and shared. It might be said that the value of our personally identifiable information is only now being recognized and the protections appropriate to that value being demanded. Diamonds get armed guards. What does your banking information deserve?
*May exclude premium content
By Kenya Parrish-Dixon
By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions logged on to their home networks and personal devices in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage.
By Mike Hamilton
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it’s become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
By Ryan Drimalla and Karl Dorwart
The London Interbank Offered Rate has long been the global basis for agreements that include a variable interest rate component. However, LIBOR would be replaced by other benchmarks by the end of 2021. Key to assessing risk of exposure, quantifying the financial impact, developing remediation plans and communicating material information to stakeholders will be the identification, analysis and remediation of LIBOR-based contracts.
By Tomas Suros
As the current pandemic has forced much of the world into virtual workforce mode, cybercriminals have seized on the uncertainty of the current times to launch new and creative offensives. Fears surrounding COVID-19 are high, conspiracy theories are running rampant, and cyberattackers are counting on stress and distraction to decrease our vigilance against intrusions.