You are here

In The News

New Security Mindset: Focus On The Interior

Chief privacy officer Jason Straight shares his insights on why organizations are struggling to stop the breach wave -- and manage the aftermath.

Media Type:
Media Source:
Dark Reading
Date:
March 18, 2015

2016 Candidates Will Grapple With Cybersecurity Issues

In recent weeks, the early frontrunners from each party — former secretary of State Hillary Clinton (D) and former Florida Gov. Jeb Bush (R) — have displayed a lack of awareness of standard email security and privacy procedures.

Media Type:
Media Source:
The Hill
Date:
March 8, 2015

High-Ranking Federal Officials’ History of Using Personal Email for Government Business

High-level federal executives routinely use personal email for business, in likely violation of the Federal Records Act. That’s according to a recent survey of federal employees. The survey was conducted by the research group Government Business Council just prior to revelations that Hillary Clinton allegedly exclusively used personal email and a private server at her Chappaqua, N.Y., residence for her government communications while serving as President Obama’s secretary of state.

Media Type:
Media Source:
The Daily Signal
Date:
March 8, 2015

4 Ways to Improve Cybersecurity via Corporate Culture

Many companies already have ramped up spending on technology and IT staff to protect their data, yet there’s little evidence that such a strategy alone is sufficient to addresses the risks. Often it is not until a major incident occurs and other business stakeholders— most notably the legal department—recognize the full impact a data breach can have on an organization.

Media Type:
Media Source:
Corporate Counsel
Date:
March 2, 2015

Law Firms Aren’t Immune to Cybersecurity Risks

Astute firms are looking to learn as they watch Target Corp., The Home Depot Inc., JPMorgan Chase & Co., Sony Corp. and others struggle to manage an endless stream of news stories that damage their brands, massive disruptions to everyday business, and a significant strain on resources as organizations respond to legal claims, comply with requests for information from regulators and scramble to bolster security systems in efforts to prevent further incidents

Media Type:
Media Source:
The National Law Journal
Date:
January 26, 2015

20 Most Promising Legal Technology Solution Providers

Over the years, law firms are transcending horizons where the litigation proceedings are being drawn across the corners of the globe. Globalization has ushered in inexorable technological best practices and cost-effectiveness across the entire litigation spectrum.

Media Type:
Media Source:
CIO Review
Date:
December 8, 2014

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches

If the cyber incidents involving Target, Home Depot, JPMorgan Chase and others are any indication. If there’s a common thread among those and other recent catastrophic security breaches, it may be that many organizations haven’t yet accepted the fact that breaches are virtually inevitable. The biggest challenge isn’t preventing them, but rather anticipating the potential fallout across the entire organization and planning accordingly.

Media Type:
Media Source:
CIO Review
Date:
December 8, 2014

Using Information Governance to Lower E-Discovery Costs

In eDiscovery, while prices for individual services like data processing and hosting have dropped dramatically in the past decade, e-discovery spend continues on a steep upward trajectory. with increasing data volumes and complexity, and the proliferation of poor or nonexistent data disposition practices, eventually the costs will become prohibitive for any organization that neglects basic information governance principles.

Media Type:
Media Source:
Legal Intelligencer
Date:
December 3, 2014

How to Plan for Cyber Risk: Fostering a Unified Approach

The pressure on attorneys and C-level executives to develop effective information security management programs has reached unprecedented levels, especially given the latest data breaches and cyber threat reports. The financial, legal and reputational fallout resulting from massive attacks on Target, Home Depot and JPMorgan Chase—to name just a few of the most prominent incidents in recent months—highlights the seriousness of the problem and the inadequacy of many organizations’ efforts to mitigate the risk.

Media Type:
Media Source:
Law Practice Today
Date:
November 17, 2014

With multiple links in the chain and no single regulatory authority, cloud compliance is a unique struggle

With multiple links in the chain and no single regulatory authority, cloud compliance is a unique struggle. Until a widespread set of regulations targeting cybersecurity and cloud storage is adopted in the U.S., corporations are on their own to determine if the services they use are up to snuff in protecting sensitive data. This is no small task, as recent Fortune 500 failures to protect data can attest. Corporate counsel must be willing to examine the terms of the cloud services contract, as well as seek a third-party audit to protect the safety of corporate data.

Media Type:
Media Source:
Inside Counsel
Date:
October 23, 2014