Ransomware? Don’t Pay It, Says FBI | Trust Anchor
What should companies do when ransomware hits? The FBI says: (a) report it to law enforcement and (b) do not […]
What should companies do when ransomware hits? The FBI says: (a) report it to law enforcement and (b) do not […]
An unusual glitch is reportedly affecting Apple customers that recently purchased new iPhones private browsing flaw in iOS 10 isn’t
Central Ohio Urology Group has now put a number to the size of its data breach August — 300,000. The
The transition period has passed, so why should companies still self-certify to compliance with the shield principles? Source: The Deadline
Technology is a crucial force, according to commentary around law firm business evolution at Reuters’ Law Firm Leaders Forum. Source:
The Sixth Circuit’s opinion is available here. United States ex rel. Sheldon v. Kettering Health Network, 816 F.3d 399 Source:
SANS Institute researchers are calling on system admins to do their part in securing connected devices. Source: SANS calls for
In February 2015, President Obama signed Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing. The order encouraged the development
ROSS’s artificial intelligence product can do legal research answer questions and write memos. Don’t fire your associates yet but the
After a brief hiatus from the limelight, is ECA back and here to stay? Source: Assessing Early Case Assessment |
The committee’s recommendations emphasize and inform clients about the core values of the legal profession and how they serve and
CyberSecure panelists discuss the differences in privacy and security, where law enforcement fits in, and more. Source: Privacy and Security
The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT
While the information stored in internet of thing (IoT) devices is still valuable, researchers spotted an increase in attacks targeting
In some states, electronic voting may complicate discovery efforts in election litigation. Source: For 2016 Election, Electronic Voting and Discovery
Improving Small Business Cyber Security Act of 2016 (Sec. 2) This bill amends the Small Business Act to authorize the
Source: Reported Massive Breach at Yahoo Provides Cybersecurity Lessons for Other Companies
The U.S. House of Representatives plans a vote on legislation that would task the SBA with assisting small businesses in
Three steps to prepare for important new rules that will impact how data is managed and governed. Source: Are You
The tools offered a streamlined interface to compare data for use in early case assessment, pitching new clients and choosing
The Industrial Internet Consortium (IIC) published a framework technical report to help organizations balance the safety and reliability needs of
The AICPA has released two draft cybersecurity-related auditing standards. An overview of the group’s initiative with links to the two proposed
Though data vulnerabilities can change the value of a deal, many companies fail to undergo thorough investigations of potential partners’
President Obama may be urged to split the joint leadership of the NSA and US Cyber Command in favor of