No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Industry Implications of EO on Improving the Nation’s Cybersecurity
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: In-House Counsel - Key Questions to Ask Your Law Firms about Technology
Sitting with the C-Suite: The Future of Legal Tech
Sitting with the C-Suite: Advice for Legal Technology Entrepreneurs
Sitting with the C-Suite: Alma Asay's Path to Legal Technology
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Servient – What’s Next
In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more
NIS2 (Network and Information Systems Directive 2) is the updated version of the NIS Directive, which the EU first introduced in 2016. The original NIS Directive aimed to enhance cybersecurity across member states by...more
In light of recent cyberattacks targeting the federal government and United States supply chains, President Biden’s administration has released an Executive Order (the “Order”) in an attempt to modernize and enhance the...more
Note to research compliance officials still digesting news of Pennsylvania State’s recent $1.25 million settlement over False Claims Act (FCA) allegations related to cybersecurity and the government’s recent intervention in a...more
The cloud intersects with personal and professional worlds for many people. Want to share photos with family from a recent trip? Upload them to a shared cloud drive and text out the link for access. Need to have several hands...more
While organizations have increasingly embraced cloud computing as a solution to their data management and other needs, they do so in an environment of heightened risks. Attacks on cloud providers are increasing, which makes...more