Cybersecurity

Federal Energy Regulatory Commission Proposes Cybersecurity Measures to Protect Electric Grid

Federal Energy Regulatory Commission Proposes Cybersecurity Measures to Protect Electric Grid

The Federal Energy Regulatory Commission has proposed cybersecurity rules to enhance data protection for the US electric grid, expanding monitoring to better detect threats outside traditional security zones.

Managing Legal Risk During AI Implementation

Managing Legal Risk During AI Implementation

Learn how to navigate legal risk during AI implementation by aligning AI tools with business goals and building trust for successful technology adoption.

Understanding The Evolving GDPR Rules On International Data Transfers

Understanding The Evolving GDPR Rules On International Data Transfers

Stay compliant with evolving GDPR rules on international data transfers. Learn how to mitigate risks, avoid penalties, and protect your organization from regulatory scrutiny.

When Paying Ransom Fails: The Risks of Faulty Decryptors in Ransomware Attacks

When Paying Ransom Fails: The Risks of Faulty Decryptors in Ransomware Attacks

Paying ransom doesn’t guarantee recovery. Read how faulty decryptors in ransomware attacks leave companies without access to their files and still at risk.

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Read how supply chain cybersecurity isn’t just about defenses. Professor SK Jeong says vulnerabilities often lie with your suppliers.

CrowdStrike Outage Highlights the Vulnerability of Digital Ecosystems

CrowdStrike Outage Highlights the Vulnerability of Digital Ecosystems

Explore how the use of AI in a company’s system amplifies the vulnerability of digital ecosystems and networks, as exemplified by the CrowdStrike incident.

Challenges and Strategies for Legal Risk in the Remote Workplace

Massive Increase In Cyber Threats Fueled By Use of Unsecured Work-From-Home Devices

Read how cyber threats have risen 400% since the pandemic, mostly because of unsecured work-from-home devices and networks.

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Learn how supply chain cyberattacks use the trust between companies that share software to find and exploit weaknesses in their mutual cybersecurity.

research experiment and medical trial being done by a scientist

Provider Consolidation Is Driving Litigation In Healthcare Data Breach Lawsuits

Read how provider consolidation ups the ante for healthcare data breach lawsuits and why settlement is the preferred option for resolution.

rise in gasoline prices

Department of Energy Releases New Supply Chain Cybersecurity Principles

Explore these supply chain cybersecurity best practices formulated by the Department of Energy to prevent disruption of critical infrastructure.

Get our free daily newsletter

Subscribe for the latest news and business legal developments.

Scroll to Top