• “Noise,” AI, And The Black Box Of Legal Judgment

    A Nobel Prize winning psychologist and a noted legal scholar have teamed up to clarify the way legal judgments are made and how the process can be improved. Their research can be applied to any type of...

    • Posted 13 hours ago
    • 0
  • 9-11 Insurance Hack Breaks New Ground In Cyber-Extortion

    By successfully breaching a law firm retained by global insurer Hiscox, a group known as The Dark Overlord has obtained a trove of litigation documents related to the 9-11 attack. “The news gives insight into how hacking...

    • Posted 1 day ago
    • 0
  • Cyber Breach Most Feared Company Crisis, Ahead Of Sexual Harassment & Violence

    The type of incident most commonly addressed by company crisis management plans is a cyber breach, according to a survey by Morrison & Foerster and the Ethisphere Institute. It was cited as the number one concern by...

    • Posted 6 days ago
    • 0
  • Cyber Attack From “State Actor” Was Just A High-Tech Heist

    It safe to say 99 percent of readers won’t follow the technical details of this post, but it’s still worth reading for someone who wants to get a feel for the kinds of threats companies are having...

    • Posted 1 week ago
    • 0
  • Hard Lesson In Privilege For Marriott Legal

    A federal court in Colorado found that analysis and sensitive advice about strategy and “Risks/Opportunities” was not protected by privilege, even though it had been drafted and reviewed by in-house lawyers, because it was contained in two sections...

    • Posted 2 weeks ago
    • 0
  • Cybersecurity Primer From The Horse’s Mouth

    A global risk management company interviews its own chief information security officer for an inside take on the essentials of enterprise cybersecurity. Among the topics discussed are the ins-and-outs of hiring black-hat hackers, how the CISO’s understanding...

    • Posted 2 months ago
    • 0
  • Employees’s Unintended Cyber-Breach Is An Underrated Threat

    The threat of the rogue employee or the vengeful former-employee is a frequent subject of cybersecurity alerts, and it’s a real issue. But companies are more likely to confront another kind of insider threat: the clueless or...

    • Posted 2 months ago
    • 0
  • SEC Turning The Screws On Cybersecurity

    In the face of a largely ineffectual “patchwork system of federal and state laws,” the SEC has emerged as a major de facto U.S. regulator of cybersecurity...

    • Posted 2 months ago
    • 0
  • Everything You Own In A Box To The Left

    In the standard Electronic Discovery Reference Model flow chart, the box farthest to the left refers to information governance - the process of getting your house in order...

    • Posted 2 months ago
    • 0
  • All The Nasty Things That Malware Can Do (To Your Website)

    Malware, most commonly understood as an infection of a device, can also refer to something that affects a website. What can happen? This post from cybersecurity company SiteLock runs through the litany, from crude defacements and “redirects,”...

    • Posted 2 months ago
    • 0