You are here

In The News

Tech Digest: 5 Legal Technology Experts on the Biggest Trends to Watch

The news and trends driving the legal technology space  evolve quickly, and, as a result, keeping abreast of the latest developments can be a difficult prospect. A single case, technological advancement or cresting trend has the capacity to disrupt not only the way law is practiced, but also the effectiveness of tools developed to support it. 

Media Type:
Media Source:
Legal Tech News
Date:
September 17, 2015

Cybersecurity Data Sharing Is Now Available to Law Firms

Law firms now have access to a platform that allows them to share data on cybersecurity threats anonymously. Several chief information officers and data security directors said they expected wide participation, although they expressed some reservations.

Media Type:
Media Source:
New York Law Journal
Date:
September 9, 2015

Data breach class-action lawsuits change cyber insurance landscape

There have been plenty of class-action lawsuits filed on behalf of consumers upset that companies and institutions did not do more to stop hackers from stealing their personal data.

Media Type:
Media Source:
Third Certainty
Date:
September 8, 2015

Do You Know Where Your Company’s Data Is?

Headlines about massive data breaches at major corporations have become commonplace. What’s striking about these high-profile hacks is that many of the affected companies were spending millions on cybersecurity measures when the breach occurred. They had gone to great lengths to prepare for the worst, only to have it happen anyway. Target, Bank of America and AT&T have all suffered serious breaches that originated with a third-party service provider.

Media Type:
Media Source:
Today's General Counsel
Date:
September 1, 2015

Wyndham vs. FTC: Corporate security pros need to lawyer up about data breach protection, experts say

Corporate security executives need to meet with their legal teams to find out whether the way they protect customer data will keep them out of trouble with the Federal Trade Commission should that information be compromised in a data breach.

Media Type:
Media Source:
Network World
Date:
August 25, 2015

In The All Together

While there are strategies legal practitioners can employ to ensure that third party vendors, consultants and law firms live by data security standards, in the event of a breach the hiring organization will still bear responsibility. Contracts and requirements may ensure that vendors contribute to the mitigation of issues following a cyberbreach— and due diligence may ease regulatory action—but all fallout will not be avoided. Evaluating a third party for cyber-readiness starts with having your own plan in place.

Media Type:
Media Source:
Legal Tech News
Date:
August 1, 2015

3 Lessons for a Proactive Approach to Cybersecurity

Many IT and security departments may have all sorts of sophisticated tools and processes for securing data in-house, but what about service providers who have access to the network? What about outside law firms handling the data on their own premises or in the cloud? And what about the vendors that those firms use?

Media Type:
Media Source:
Corporate Counsel
Date:
July 20, 2015

The Role of the Board In Cybersecurity: ‘Learn, Ensure, Inspect

Board members of the most forward-thinking U.S. companies are not just throwing money at the mounting problem of managing cyber risk.

Media Type:
Media Source:
Dark Reading
Date:
July 8, 2015

Get a Handle on Third-Party Cybersecurity Risks

No one should be shocked to learn that third-party vendor security has become a top priority for enterprises of all kinds. And in the wake of the Anthem breach—Anthem being one of the nation’s largest third-party vendors—many companies are finally paying attention to the third-party threat. 

Media Type:
Media Source:
The Recorder
Date:
July 8, 2015

Pointing the Finger of Blame Over a Data Breach

You rarely go a couple of weeks without hearing about some kind of major data breach. From retail outlets to dating sites to healthcare providers, nothing is off limits for hackers in search of credit card info or personal data.

Media Type:
Media Source:
IDG Connect
Date:
June 23, 2015