Cybersecurity
Stay compliant with evolving GDPR rules on international data transfers. Learn how to mitigate risks, avoid penalties, and protect your organization from regulatory scrutiny.
Paying ransom doesn’t guarantee recovery. Read how faulty decryptors in ransomware attacks leave companies without access to their files and still at risk.
Read how supply chain cybersecurity isn’t just about defenses. Professor SK Jeong says vulnerabilities often lie with your suppliers.
Explore how the use of AI in a company’s system amplifies the vulnerability of digital ecosystems and networks, as exemplified by the CrowdStrike incident.
Read how cyber threats have risen 400% since the pandemic, mostly because of unsecured work-from-home devices and networks.
Learn how supply chain cyberattacks use the trust between companies that share software to find and exploit weaknesses in their mutual cybersecurity.
Read how provider consolidation ups the ante for healthcare data breach lawsuits and why settlement is the preferred option for resolution.
Explore these supply chain cybersecurity best practices formulated by the Department of Energy to prevent disruption of critical infrastructure.
Learn more about Colorado’s AI law, which sets a precedent requiring businesses to prevent algorithmic discrimination and ensure transparency in AI systems.
Cyber insurance claims are on the rise. Discover how securing boundary devices and adopting robust strategies can help safeguard against escalating threats.
Get our free daily newsletter
Subscribe for the latest news and business legal developments.