Archives
Sorted by: Law & Technology

The Marriott breach: four years?

The recent Marriott breach resulted in the theft of data regarding 500 million guests. To many, however, the most troubling aspect of the breach is not the sheer number of people affected, but the fact that the breach was ongoing for four years. For four years, Marriott did nothing to stop the leak of customer […]

Read More

“Papers and effects” in a digital age 

In 1761, Boston patriot James Otis argued against England’s use of its “writs of assistance.” Such writs, widely used in colonial times, permitted English officials to enter a Crown subject’s private home or office—at will, and without regulation. These warrantless searches, also called “general searches,” were used to investigate purported crimes against the Crown.  Otis […]

Read More

The Chinese spy chip scandal and supply chain security

Last month, the security world was abuzz over allegations that Chinese spy chips had affected American motherboards on a staggering scale and had compromised sensitive data. Through these spy chips, according to an October 4 investigative report in Bloomberg Businessweek, Chinese perpetrators had successfully enacted a surveillance campaign. Bloomberg’s initial reporting was met with harsh […]

Read More

Don’t forget the inside threat

Judging by the types of breaches we regularly hear about in the news, from the recent Facebook hack to China’s secret implantation of spy chips inside motherboards (which I’ll be discussing in my next article), it would seem that the biggest threats to our digital security are primarily external. Social engineering attacks such as phishing scams […]

Read More

Cyberattacks and the costs of reputational harm

A few months ago, I wrote about cyber insurance and its place in an organization’s cybersecurity plans (“Managing cyber risk: Is cyber liability insurance important for law firms?”, June B&B). In my estimation, the most valuable aspect of cyber insurance lies in applying for it. Making organizations go through the paces to evaluate their cybersecurity postures, […]

Read More

Fair elections and cybersecurity

With the November congressional elections right around the corner, many observers are revisiting a primary theme of the 2016 presidential election—security, hacking, and Russian involvement. It is certainly a contentious topic, but no matter where you fall on the political spectrum, it remains the case that elections are just as vulnerable to cyberattacks as private […]

Read More

E-discovery vs. forensics: Analyzing digital evidence

Digital evidence continues to be a growing focus of the legal community. In a very real way, digital evidence and its utilization in court can be compared to the advances in the use of DNA science that our courts saw in the last century. In a ubiquitously digital world, digital evidence has applications in almost […]

Read More

Social media and managing reputational risk

Recent events involving a certain television show remake and its quick and much-applauded cancellation have me ruminating on the repercussions of social media usage. In today’s digital world, many of us feel pressured to keep up with the constant onslaught of information that presents itself to us on a minute-by-minute basis. Through any number of […]

Read More

Managing Cyber Risk: Is cyber liability insurance important for law firms?

Cyber liability insurance policies are growing in popularity among organizations that store client data, but in my experience those who have them are probably just as confused about what they cover as those who decide to go without. Generally described, cyber liability insurance is meant to protect businesses and organizations from cybersecurity risks posed by […]

Read More

Social engineering: How cybercriminals capitalize on urgency

Making a request seem urgent clouds the fact that the request violates protocol or the norm.  I was recently approached by a concerned person who wanted me to scrutinize an email received a few days prior. “Does this look like a phishing email? I don’t see any grammatical errors. But it’s asking me to visit this […]

Read More
Page 1 of 212»

Articles by Issue

Articles by Subject