More Cybersecurity Articles

Cybersecurity

In the Cross-Border Data Crosshairs: Focus on four areas to mitigate the danger of data transfer across borders

Cross-border data transfers are not only frequent, but often crucial components of everyday business. Today’s patterns of global data flow would be unrecognizable to a technologist of 20 years ago, and developments in global communication networks and business processes continue to evolve at...

Read More

Cybersecurity

Practical Legal Considerations When Thinking About Cloud Computing

With applications, documents, videos, podcasts and other programs, businesses are running into a common problem – limited space (or memory) to host files locally or internally. Many businesses are increasingly looking to “the cloud” as a solution, allowing scalable and secure data...

Read More

Cybersecurity

A Triple Cyber-Whammy: Government, Companies and Hackers Squeeze Contractors

Government contractors are in a difficult position when it comes to cybersecurity. Not only do they need to worry about cybersecurity issues that affect almost every company, but they also often house sensitive government data that can carry additional obligations. Further, the very fact that they...

Read More

Recent Cybersecurity Video