Legal

Legal | News, how-tos, features, reviews, and videos

sacramento california state house
julian assange wikileaks 1

10 cloud security breach virtualization wireless

A hacker or your cloud provider. Who presents the greatest risk to your data?

The latest threat to your data may not be a hacker, but your own cloud provider, who can suspend performance and hold your data hostage.

orange number 5 pool ball top five 5 tips

Top 5 solutions to reduce ‘cyber friction’

The biggest problem areas and solutions to reduce friction between cybersecurity, privacy and legal teams.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Landmark laws: data brokers and the future of US privacy regulation

Vermont’s new law on data brokers has revealed an expansive registry of secretive firms profiting from your corporate and personal data. As the first law of its kind in the US, privacy advocates have rejoiced – but how much will it...

intel primary

The federal privacy bill: Intel gets the ball rolling

As momentum builds to pass a federal privacy bill, corporate behemoth Intel has drafted a bill palatable to tech giants. But will politicians take the bait?

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Corporate pre-crime: The ethics of using AI to identify future insider threats

Remember “Minority Report”? Artificial intelligence can spot employee behavior that suggests a future risk. Here’s how to use that data ethically and effectively.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Duty of care: Why (and how) law firms should up their security game

Lawyers have been slow to adopt modern technology — and even slower to respond to security threats. That may be changing.

rules procedures manuals one way signs

GDPR is live! – Now what?

GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots.

globe

Why Africa’s private sector should be concerned about more than the GDPR

The European Union General Data Protection Regulation (GDPR) has generated strong interest in Africa’s private sector. However, the bigger picture shows massive gaps across Africa’s data privacy landscape. This article highlights some...

signature signing contract handwriting cursive

Do those stellar security obligations really provide any protection?

It is vital for businesses to understand limitation-of-liability clauses in vendor contracts, especially when recovering damages from a cybersecurity breach. Here is insight into these clauses, including how businesses can best draft...

blame select pointing finger trending

Scapegoating security researchers harms society

Want your government to stop punishing the security community for its own lapses? Become a better teacher and advocate for what you do.

Android Smart Lock Trusted Places

Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance

With the finable GDPR compliance deadline just weeks away, the vultures are circling – and leading the pack is a group of companies touting so-called ‘cyber insurance’. While the majority of IT security vendors are opting to scare...

04 cyberlaws gavel

Georgia governor vetoes bill that would criminalize good-faith security research, permit vigilante action

Veto comes in response to overwhelming criticism from industry. Georgia cybersecurity folks had been outraged about SB 315, and warned that it could cost the state jobs.

apple store

Apple means business when protecting intellectual property

Apple takes the protection of intellectual property very seriously. In 2017, it says 27 people were caught and 12 arrested for revealing inside information.

security trust

Charter Communications, who can you trust?

Charter Communications, its union, its customers and the New York attorney general all are experiencing trust issues.

3 legal law books

Insider threat legalese

Understanding your lawyer’s perspective on insider threats...and three suggestions to help start the conversation.

man with binoculars reading the fine print contract examine

Key articles in the GDPR for the enterprise

Major data breaches are on the rise and information law is rising in response. The GDPR is perhaps the most prominent example of this shift to a more customer-centric data protection ideology.

communication understanding executives phone diversity

Alternative communications planning and cybersecurity incident response

Cyberattacks can happen for a whole variety of reasons. No company is entirely safe. And these days, when digital communication is so vital to the basic operations of a company, incorporating a messaging strategy that takes into...

ricoh ediscovery public cloud

I’m using the public cloud, should I care about GDPR?

GDPR says you should care, but how you should go about it remains murky at best.

Load More
You Might Also Like