Cybersecurity

 
 
  • Pile of Vote Badges - US Elections Concept Image
    21 U.S. States Targeted By Russia In Election

    Two Department of Homeland Security officials confirmed this week that internet-connected election networks and websites in 21 states were targeted by Russian hackers in 2016. Acting DHS deputy undersecretary Dr. Samuel Liles and acting deputy undersecretary for...

    • Posted 6 days ago
    • 0
  • iStock_work email
    NY State Supreme Court Justice Fleeced In Phishing Scam

    New York State Supreme Court Justice Lori Sattler was scammed out of more than $1 million after she fell victim to an email phishing scheme. Sattler, who was trying to sell her Upper East Side apartment, thought...

    • Posted 7 days ago
    • 0
  • Negotiating a Tech Contract with a Large Customer

    For a technology provider, getting the chance to contract with a large company can be a welcome opportunity. But these opportunities come with sophisticated, demanding legal teams. Large companies tend to dictate very customer-favorable terms, and they...

    • Posted 1 week ago
    • 0
  • Best Cyber Security Practices

    Companies spend millions guarding against external threats, but often ignore internal threats that can be more devastating. Policies and permissions should be established for all who work at the company, from the c-suite to contract workers and...

    • Posted 1 week ago
    • 0
  • Protecting Your Company from Cybersecurity Litigation

    Increased connectivity across all industries has greatly increased the potential for data breaches. Post data breach consumer lawsuits, typically asserting breach of contract or negligence theories, are on the increase. Shareholder lawsuits, which often assert claims for...

    • Posted 1 week ago
    • 0
  • iStock_computer file
    RNC Vendor Exposed Millions Of Voter Files Online

    An expansive Republican database of voters, including information from 198 million Americans, was left vulnerable to virtually anyone with a computer for days. The data was compiled by Deep Root Analytics, which advises campaigns on TV advertising....

    • Posted 1 week ago
    • 0
  • Internet of things (IoT) concept. Businessman offer IoT solution represented by symbol connected with icons of typical IoT – intelligent house, car, camera, watch, washing machine and cooker.
    Explosive Growth In IoT Security Attacks

    In a “honeypot” experiment it was only seconds before the first attempts at a breach were registered, and over the next 24-hours...

    • Posted 1 week ago
    • 0
  • plants on piles of euro coins
    Sustainability Accounting Standards As The New GAAP

    A hundred years ago, basic corporate financials were considered nobody’s business but the company’s. It took the depression of the 1930s to begin seriously chipping away at that mindset. A milestone was reached in the 1970s when...

    • Posted 2 weeks ago
    • 0
  • Autonomous cars on a road with visible connection
    The Regulatory Challenge of Autonomous Vehicles

    Autonomous vehicles are coming soon, and with them unprecedented regulatory challenges, although it’s not the first time that regulators and urban planners have had to confront a paradigm-wrenching transportation crisis. Attorney Roy Keidar recalls “the great horse...

    • Posted 3 weeks ago
    • 0
  • Pachnanda_final
    Legal Competence And The Role Of Technological Expertise

    In addition to understanding the technology of their client’s business, lawyers need to understand the technology that is part of their own practice. A majority of states have now adopted some version of the ABA model rule...

    • Posted 3 weeks ago
    • 0