Angle
US Federal Contractors Face Stricter Regulation Over Cyber Incident Response Reporting
2 Mins
Last October, the United States' Federal Acquisition Regulation (FAR) Council proposed two new rules, one of which that will influence cyber incident response practices. The scope is...
Read MoreLooking at Data Breach and Class Action Exposure Through a Single Lens
3 Mins
There has been a spike in data breach class actions this year. According to a study by Law.com Radar, the monthly average of data breach class actions was 44.5 from January through August...
Read MoreMoving Information Governance to the Driver’s Seat to Accelerate Cyber Breach Response
3 Mins
Information Governance often takes a back seat to other organizational initiatives. But why is this the case? The list of reasons is long and varied. Not knowing where to start or how to...
Read MoreDeepfakes Bring Deep Risk
3 Mins
Most people know what a deepfake is but have not put much thought into how it could affect business operations. Deepfakes are videos, pictures, or audio that have been convincingly...
Read MoreIt’s Time to Blow the Whistle on Deficient Cyber Reporting Programs
4 Mins
What exactly is cybersecurity whistleblowing? That is a question that all organizations should be asking, but the answer is not a simple one. According to the Merriam-Webster dictionary...
Read MoreMandated Cyber and Privacy CLE for New York Attorneys – Will Other States Follow Suit?
3 Mins
The majority of U.S. states require attorneys with active law licenses to complete continuing legal education (CLE) credits. The number of hours, reporting deadlines, and topic...
Read MoreKey Ethical Obligations in the Era of Modern Law
3 Mins
To achieve modernization, the legal industry is operating off a new mindset requiring focus on efficiency and innovation when making operational decisions. Legal departments, law firms...
Read MoreCounsel and the Breach Response Lifecycle: Best Practices at Every Stage
3 Mins
The shift to automated business processes and digital data management has definitely been a key enabler for organizations across industries. This fosters more efficient transactions...
Read MoreRising Premiums and Ransomware: The Cyber Insurance Balancing Act
5 Mins
With greater potential for data compromises comes a greater need to explore cyber insurance. The dilemma that ensues is that when attack prevalence rises, it heightens risk for both...
Read MoreData at Your Fingertips? Make Sure You are Prepared for Biometric Data Legislation
6 Mins
Biometric technology data is generated more frequently these days in private and professional settings as authentication methods like fingerprint scanning, facial recognition, and voice...
Read More