Latest Posts › Software

Share:

Patch, Investigate, and Defend: Critical and High Vulnerabilities in Cleo Managed File Transfer Solutions Reportedly Under Attack

There is news coming from the U.S. cyber community for organizations that use Cleo’s software products: if your organization or your vendors use Cleo’s Cleo Harmony, VLTrader, or LexiCom products, you may be at heightened...more

Healthcare Provider Beware: Massachusetts Federal Court Largely Permits Tracking Technologies and Wiretapping Claims To Proceed

In the privacy world, pixels, cookies, and tracking technologies get all the attention these days. Plaintiffs and regulators alike have been working to persuade courts nationwide that the presence of third-party tracking...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide