Account

Sign in to access your account and subscription

Technology Media and Telecom

  • Effective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone's responsibility and constant security awareness by all users of technology.

    May 01, 2019David G. Ries
  • The Conclusion of the “Transitional Period” for New York's Cybersecurity Regulation Marks the Beginning, Rather Than the End, of an Organization's Compliance Efforts

    Financial institutions will have to certify annually that their internal controls and cybersecurity practices remain up to snuff. And now that the transitional periods for implementing the cyber regulation have passed, covered institutions will need to certify that they have complied with each provision.

    May 01, 2019Craig A. Newman and Kade N. Olsen
  • Copyright, Fortnite and the Ability to Protect How You Shake Your Groove Thing The U.S. Supreme Court just crashed the copyright world's latest dance party — stepping on the toes of a soiree of copyright infringement lawsuits against videogame developer Epic Games, the creator of Fortnite.

    May 01, 2019Erin Hennessy, Annie Allison and Logan Kotler
  • In an environment of moving targets, it seems unimaginable that insurance against cybersecurity attacks can be robust enough to provide real protection. There are many types of risks involved, and some include physical damage to property.

    April 01, 2019Nina Cunningham
  • Apart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.

    April 01, 2019Ankur Sheth and Jano Bermudes