Cybersecurity

Endpoint Data Control Needs Attention Thanks to Data Sprawl

Endpoint Data Control Needs Attention Thanks to Data Sprawl

Learn why data sprawl is making it hard for organizations to implement endpoint data control and other data governance practices.

Navigating Data Privacy Regulations for Mobile Apps: What Brands Need to Know

Navigating Data Privacy Regulations for Mobile Apps: What Brands Need to Know

Learn how to shape your company’s practices and policies to reflect the latest data privacy regulations for mobile apps.

Exploring the Surge in ADA Compliance and Data Breach Class Action Lawsuits

Exploring the Surge in ADA Compliance and Data Breach Class Action Lawsuits

Discover how ADA compliance is at the center of a wave of class action lawsuits highlighting the intersection of technology, accessibility, and legal challenges.

Lessons from the Change Healthcare Incident and the HIPAA Security Rule

Lessons from the Change Healthcare Incident and the HIPAA Security Rule

Delve into the aftermath of the Change Healthcare incident and discover how regulatory updates like the HIPAA Security Rule are shaping data protection.

The Complex Costs of Cybersecurity Breaches

The Complex Costs of Cybersecurity Breaches

From financial ruin to legal quagmires, learn more about the complex costs of cybersecurity breaches plaguing businesses worldwide.

DOJ Data Privacy Enforcement Program Launched in Response to Growing Threats

DOJ Data Privacy Enforcement Program Launched in Response to Growing Threats

Discover how the new DOJ data privacy enforcement initiative is reshaping digital security landscapes. Stay ahead of evolving threats with insights on the latest measures and safeguards.

woman at self-serve kiosk

What Companies Should Know About Kiosk Fraud Prevention

Who wants to endure tedious airport lines for a boarding pass when a kiosk offers an effortless process? Self-service kiosks […]

Alaska Airlines Boeing 737 plane

Boeing’s PR Debacle Delivers A Lesson in Crisis Management

In January 2024, a door plug panel blew off an Alaska Airlines Boeing 737 MAX 9 in mid-flight, causing rapid […]

Mitigation Strategies for Managing Third-Party Data Breaches

Mitigation Strategies for Managing Third-Party Data Breaches

Dollar Tree, Bank of America, Comcast, and Colonial Pipeline have all been victims of high-profile third-party data breaches, indicative of […]

cyber risk ratings

Prioritizing Cyber Risk Ratings in the Wake of SEC Regulations and Evolving Threats

With increased Securities and Exchange Commission (SEC) regulations, more cyber threats, and evolving technological exposures, all organizations must prioritize understanding […]

Get our free daily newsletter

Subscribe for the latest news and business legal developments.

Scroll to Top