Cybersecurity

Illicit Network Underscores Infrastructure Risks Facing Cellular Networks

Illicit Network Underscores Infrastructure Risks Facing Cellular Networks

An illicit network seized by the secret service reveals the vulnerability of cellular networks, underscoring the infrastructure risks for governments and businesses alike.

Google is Forming a Cyber Disruption Unit, Offensive Strategy Debated

Google is Forming a Cyber Disruption Unit, Offensive Strategy Debated

Learn about Google’s plan to initiate a cyber disruption unit, while policymakers debate the legal limits of private cyber-attack operations.

New COPPA Rule Expands Data Transparency and Security Obligations

Cybersecurity Versus Hackers: Who Is Winning?

AI is changing the game for both sides, but experts agree that progress is coming in the ever-evolving digital battle between cybersecurity and hackers.

New COPPA Rule Expands Data Transparency and Security Obligations

New COPPA Rule Expands Data Transparency and Security Obligations

The revised Children’s Online Privacy Protection Act (COPPA) Rule strengthens transparency, consent, and data retention obligations for children’s data. Learn more about the compliance requirements.

Transforming Cyber Insurance Claims into Strategic Risk Management Insights

Transforming Cyber Insurance Claims into Strategic Risk Management Insights

Cyber insurance claims offer valuable lessons for risk managers, revealing vulnerabilities and guiding stronger defenses against evolving cyber threats.

How a Cyberattack Could Cripple the US Electrical Grid

How a Cyberattack Could Cripple the US Electrical Grid

Discover why a cyberattack on the US electrical grid could trigger blackouts, chaos, and legal risks that businesses and law firms can’t afford to ignore.

The Complex Costs of Cybersecurity Breaches

Preserving Privilege in the Wake of a Cyberattack: A Litigation Risk Law Firms Can’t Ignore

Organizations often rely on forensic investigations after a cyberattack. But, they can become liabilities if not properly structured for preserving privilege.

CISA Warns of Growing Threats to SaaS Applications with Weak Security

CISA Warns of Growing Threats to SaaS Applications with Weak Security

The Cybersecurity and Infrastructure Security Agency (CISA) warns that attackers are exploiting the security weaknesses of cloud SaaS applications, urging firms to strengthen their defenses.

Complying with New DOJ Rule on Sensitive Personal Data

Complying with New DOJ Rule on Sensitive Personal Data

A new DOJ rule restricts how US firms handle personal data, and violations carry steep penalties. Learn more about compliance before the July 8 deadline.

The Rising Threat of AI Voice Hijacking in Cybersecurity

The Rising Threat of AI Voice Hijacking in Cybersecurity

Learn more about AI voice hijacking, the latest cyber threat. Just seconds of audio can fool employees, bypass voice security, and cost businesses millions.

Get our free daily newsletter

Subscribe for the latest news and business legal developments.

Scroll to Top