Cybersecurity & Privacy

  • IP security checkpoint: Can inside counsel trust IP management providers to protect their data?

    Inside counsel in particular must ensure that all third-party vendors hosting sensitive intellectual property (IP) data are continuing to address new risks as the threat landscape continues to evolve.

  • Time to sharpen your tech chops

    As an amateur student of human behavior (some would say “busybody”), I’ve always been fascinated by how new occupations come into being, and how existing jobs change. For example, a few years ago, during a few cross-country and intercontinental flights, I was always sitting next to someone who was studying...

  • Working out

    Law departments are tasked with cutting costs wherever and whenever possible. They leverage software and analytics, operations professionals and more to achieve savings. But the fact of the matter is, in-house lawyers are often stretched thin with the amount of work—both legal and otherwise—that comes across their desks. So, what...

  • Cyber suits

    Businesses need to be prepared—as best as possible—for the escalating number of cyber breaches and the threat of resulting litigation.

  • Securing your assets

    The highest profile hacks, the ones that get the most digital ink, are the ones that affect millions of people. When personally identifiable information (PII) is stolen from a major healthcare company or retail provider (think Target), millions of ordinary citizens find themselves in financial jeopardy, and the media and...

  • Regulatory priority

    In many ways, 2014 was the Year of the Data Breach. That year saw cyber-events at the Home Depot, JPMorgan Chase and Sony Entertainment, and the trend followed into 2015, with healthcare providers and government agencies showing that they, too, are vulnerable to attack. All of the incumbent attention that...

  • Employee attitudes fuel your data security plan

    Your company's employees can support or undermine the foundation of your data security plan. They are the most likely to be targeted and the easiest to leverage into a valuable asset. We all are overwhelmed by security threats and proactively taking action can be daunting. At home, your employees might...

  • Cybersecurity litigation: The tip of the iceberg, part two: Regulation and legislation

    Late July through mid-August 2015 brought three hacks that may signal increasing regulator involvement in cybersecurity: the first automobile recall based on cybersecurity vulnerabilities (FCA US LLC’s recall of 1.4 million vehicles); the U.S. Food and Drug Administration’s instruction that hospitals cease using the Hospira pump, a computerized system for...

  • Forget earthquakes: Building a data breach preparedness kit for your brand

    Few phrases make brand owners more nervous than “information security” and “data breach.” Today’s in-house counsel must not only be a legal expert, but an expert in all aspects of her client’s business, including technology.

  • Data breaches: Is your attitude about data security putting you and your company at risk?

    With all of the recent data breaches, the nervous jitters among those who have spent time ordering new credit cards or signing up for credit monitoring are no surprise. The possibilities of what might happen seem overwhelming and with no easy cure, action perhaps seems too daunting.

Next »

Advertisement. Closing in 15 seconds.