More Cybersecurity Articles

Cybersecurity

Tying It Together: Successful incident response plans start with thoughtful data governance

Incident response plans are crucial in an organization’s overall strategy for handling potential data breaches and incidents. An incident is defined as a security event that compromises the integrity, confidentiality or availability of an information asset. A breach is an incident that...

Read More

Artificial Intelligence

Discovery Tips for Government Investigations: Develop a cleaner process with these preemptive guides

This article is for attorneys and in-house counsel involved in the e-discovery portion of an internal investigation or government subpoena. The commentary is meant to be general – it should apply to investigations involving the Office of Inspector General, the Department of Justice, the SEC,...

Read More

Banking

How to Rob a Bank in 10 Easy Clicks

Bank robbery used to be a very simple affair. All you needed were a few fast horses, a handful of men or women who were quick on the draw, and some black hats and bandanas to hide behind. Since these attacks were purely physical, banks had simple defenses. Strong vaults and locks kept the money...

Read More

Recent Cybersecurity Video