Expert Network for Women in Healthcare and Life Sciences
Building a law firm off of 1.7 million TikTok followers - Legally Contented podcast
New LinkedIn Feature You Need To Know About
[EP. 40: LEGAL MARKETING MINUTES] Are Younger People Better At Social Media (video)?
[EP. 40] Are Younger People Better At Social Media?
[EP. 40: LEGAL MARKETING MINUTES PODCAST] Are Digital Natives Better At Social Media?
[EP. 39 LEGAL MARKETING MINUTES - VIDEO] "The 3 Main Reasons Lawyers Should Use LinkedIn"
[EP. 39 LEGAL MARKETING MINUTES - PODCAST] "The 3 Main Reasons For Using LinkedIn"
Celina Kirchner Discusses Social Media Advertising Laws
The Ever-Expanding Scope of Social Media Discovery
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
FCPA Compliance and Ethics Report-Episode 150-Tanya Otterstein-Liehs on the Process of Fitness
Allen Matkins/UCLA Anderson Forecast Summer/Fall 2014: California’s Tech Boom Drives New Demand for Office Space
Do You Use Social Media in Your Practice?
Why Law Firms Are Starting to Think Like Media Companies
Social Networking: New Risks & Opportunities at Work
Video Sharing App Vine Hit with Takedown Notice from Prince
On January 16th, Missouri Attorney General Andrew Bailey announced that he plans to issue a regulation that requires social media platforms to “offer algorithmic choice” to users....more
Australia has recently taken significant action in the realm of data security that will potentially have global impact. In December 2018, the Australian Competition and Consumer Commission (“ACCC”) released recommendations on...more
Social media companies like Facebook and Twitter have written “white papers” and devoted considerable resources to projects intended to create services that encourage trust and a sense of familiarity on the part of users....more
Tobias Boelter, a University of California Berkeley cryptography researcher claims that last year he found a security flaw in WhatsApp’s encrypted smart phone messaging application. The flaw, which relates to the unique...more
We leave breadcrumbs of biometric information scattered around our daily lives, which may be collected and used by private entities, often without our knowledge or consent. The sound of your voice when you call your bank’s...more
Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more