Skip to Content (custom)

Angle

Breaking Down the New SEC Cybersecurity Rules

4 Mins

On July 26, the Securities and Exchange Commission (SEC) adopted new cybersecurity rules. Organizations will need to disclose material cyber incidents pursuant to a prescribed timeline...

Read More

Deepfakes Bring Deep Risk

3 Mins

Most people know what a deepfake is but have not put much thought into how it could affect business operations. Deepfakes are videos, pictures, or audio that have been convincingly...

Read More

It’s Time to Blow the Whistle on Deficient Cyber Reporting Programs

4 Mins

What exactly is cybersecurity whistleblowing? That is a question that all organizations should be asking, but the answer is not a simple one. According to the Merriam-Webster dictionary...

Read More

Elevating Cyber Risk Analysis During M&A Due Diligence

4 Mins

Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components...

Read More

Mandated Cyber and Privacy CLE for New York Attorneys – Will Other States Follow Suit?

3 Mins

The majority of U.S. states require attorneys with active law licenses to complete continuing legal education (CLE) credits. The number of hours, reporting deadlines, and topic...

Read More

Key Ethical Obligations in the Era of Modern Law

3 Mins

To achieve modernization, the legal industry is operating off a new mindset requiring focus on efficiency and innovation when making operational decisions. Legal departments, law firms...

Read More

Counsel and the Breach Response Lifecycle: Best Practices at Every Stage

3 Mins

The shift to automated business processes and digital data management has definitely been a key enabler for organizations across industries. This fosters more efficient transactions...

Read More

Rising Premiums and Ransomware: The Cyber Insurance Balancing Act

5 Mins

With greater potential for data compromises comes a greater need to explore cyber insurance. The dilemma that ensues is that when attack prevalence rises, it heightens risk for both...

Read More

Data at Your Fingertips? Make Sure You are Prepared for Biometric Data Legislation

6 Mins

Biometric technology data is generated more frequently these days in private and professional settings as authentication methods like fingerprint scanning, facial recognition, and voice...

Read More

Tips for Avoiding Hidden Costs in a Cyber Incident Response

6 Mins

Tips for Handling a Cyber Incident Review

5 Mins

A cyber security incident is a stressful and frightening event for an organization’s team. When it comes to putting cyber plans in place, organizations need to prepare for the worst-case...

Read More
Pagination.PreviousPage 1 2 3 4 Pagination.NextPage