News & Analysis as of

Data Security Young Lawyers Hackers

Snell & Wilmer

Snell & Wilmer Rolls Out Interactive Data Breach Map

Snell & Wilmer on

Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more

Maynard Nexsen

When It Comes to Cybersecurity, Passwords are Passé

Maynard Nexsen on

In the ever-changing landscape of data security, it is increasingly clear that law firms of all sizes, from the one-lawyer shop to the 1,000-lawyer megafirm, are being targeted by hackers. As the methods used to gain access...more

Ballard Spahr LLP

Ponemon Institute Study on Costs of Data Breaches Highlights Improvement and New Risks for U.S. and Global Companies

Ballard Spahr LLP on

The average cost of a data breach, on both an aggregate and a per-record basis, has decreased slightly according to the Ponemon Institute's 2017 Cost of Data Breach Study: Global Overview. In addition to presenting recent...more

Orrick, Herrington & Sutcliffe LLP

No Harm, But Foul? FTC Sues Internet of Things Maker D-Link for Security “Vulnerabilities” Despite No Allegations of Breach

Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more

K&L Gates LLP

Hold On, You Didn’t Overpay for That: Courts Address New “Overpayment” Theory from Plaintiffs in Data Breach Cases

K&L Gates LLP on

With the ever-increasing amount of personal information stored online, it is unsurprising that data breach litigation has become increasingly common. A critical issue in nearly all data breach litigation is whether a...more

BCLP

Data Privacy Considerations for Starting or Evaluating a Bounty Program

BCLP on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide