Cybersecurity
More Cybersecurity Articles
Cybersecurity
In the Cross-Border Data Crosshairs: Focus on four areas to mitigate the danger of data transfer across borders
Cross-border data transfers are not only frequent, but often crucial components of everyday business. Today’s patterns of global data flow would be unrecognizable to a technologist of 20 years ago, and developments in global communication networks and business processes continue to evolve at...
Read MoreCybersecurity
Practical Legal Considerations When Thinking About Cloud Computing
With applications, documents, videos, podcasts and other programs, businesses are running into a common problem – limited space (or memory) to host files locally or internally. Many businesses are increasingly looking to “the cloud” as a solution, allowing scalable and secure data...
Read MoreCybersecurity
A Triple Cyber-Whammy: Government, Companies and Hackers Squeeze Contractors
Government contractors are in a difficult position when it comes to cybersecurity. Not only do they need to worry about cybersecurity issues that affect almost every company, but they also often house sensitive government data that can carry additional obligations. Further, the very fact that they...
Read More