Cybersecurity
More Cybersecurity Articles
Cybersecurity
The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically
These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention. Acronyms and...
Read MoreCybersecurity
Four Things Lawyers Can Do to Improve Cyber-Risk Programs: You need to think of yourself as both a steward and a shepherd
The role of corporate counsel has been rapidly evolving in the past few years. The scope of responsibilities has expanded beyond legal administrative tasks to include companywide risk management, cost control, regulatory compliance and other areas that affect the company’s reputation and...
Read MoreCybersecurity
5 Tips to Help Mitigate Insider Theft: It starts with defining the line between personal and corporate information
Information is an extraordinarily prized corporate asset. In today’s digital age, that information is stored electronically. For example, software companies store their highly valuable intellectual property in code repositories. Healthcare companies store personal medical records in an...
Read More