No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Industry Implications of EO on Improving the Nation’s Cybersecurity
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: In-House Counsel - Key Questions to Ask Your Law Firms about Technology
Sitting with the C-Suite: The Future of Legal Tech
Sitting with the C-Suite: Advice for Legal Technology Entrepreneurs
Sitting with the C-Suite: Alma Asay's Path to Legal Technology
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Servient – What’s Next
A series of recent cybersecurity breaches reveals significant vulnerabilities within educational and technology institutions, underscoring the urgent need for strengthened defenses. Among the most prominent incidents is the...more
Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more
In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more
On April 16, 2018, Beazley Group issued a report highlighting increased attacks on Microsoft’s cloud-based business products and services. The report stated that successful attacks typically are achieved by tricking employees...more
The Situation: Earlier this year, the People's Republic of China enacted its Cybersecurity Law, which granted authorities broad, explicit powers to monitor and investigate activities falling under its purview, along with the...more