This article looks at some of the issues that may arise if a cryptocurrency exchange becomes a debtor in a case under the Bankruptcy Code.
- February 01, 2019Richard J. Mason
2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.
January 01, 2019Leigh-Anne GallowayFor years, the U.S. has maintained an active enforcement campaign against overseas cyber criminals and while these past efforts have not been haphazard, they have not necessarily been part of a specific drive to address the serious issue of foreign cybercrime committed by nation states. Recent announcements by the DOJ show that this enforcement campaign is accelerating and expanding.
January 01, 2019Ronald Cheng and Mallory JensenIn 2017, Atlanta attorney Bess Hinson founded the Atlanta Women in Cybersecurity Roundtable, an invitation-only initiative to provide community and resources to advance women in cybersecurity in Atlanta. Here, we speak with some of those women leaders about their biggest security and privacy challenges and why women are pursing legal and other roles in the cybersecurity and privacy field.
January 01, 2019Adam SchlagmanThe Big 4 accounting firms have identified legal services as an area for growth beyond traditional financial services and consulting services.
January 01, 2019Ishan GirdharDefending your corporation from advanced cyber threats is a difficult and never-ending challenge. The attack surface of an organization is constantly adapting to meet the needs of a business and attack vectors are increasing nearly every few hours.
January 01, 2019Tyler YoungThe use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
January 01, 2019Alastair JohnsonBeing prepared for the worst before it even happens can minimize the damage in the event of a cybersecurity incident. To get any company ready for a cybersecurity event, the first step is to organize a team to write a mock breach notification letter that will represent your message to the world about your failure in the event you have a breach.
January 01, 2019Stephen MooreThis article delves into YouTube's policies for channel monetization, explores the different streams of revenue an artist or creator may be entitled to receive for their works, and offer suggestions to indie creators and more established creators, so they can meet these new thresholds.
January 01, 2019Gwendolyn SealeIn the past year, the devastation caused by natural disasters has been immense. Law firms, like every other business, are left to deal with the aftermath of these catastrophic events. Firms that have established business continuity plans to put into effect when these instances occur will find themselves a step ahead in the disaster recovery process. And the ones leveraging cloud technology are at an even greater advantage.
January 01, 2019Jonathan Reed











