FYI
Insights on Technology and How We Use It
Zero Trust - Never Trust, Always Verify
Zero trust cybersecurity protocols may enable law firms and other organizations to create a more resilient protection network, but how do they get there?
Ransomware Attack - What Really Happens and How to Survive
What really happens? What steps can companies and law firms take to better survive a ransomware attack? Prior planning and open communication with all stakeholders is a good start.
The Internet of Behavior - Can It Really Change Us?
As we evolve toward the Internet of Behavior, will people be able to accept being monitored, tracked, and analyzed with a mix of data technology and behavioral science?
Achieving Cybersecurity Maturity In Your Law Firm
Law firms can achieve a level of cybersecurity maturity that allows them to detect & contain a cyber-threat before it even has a chance to disrupt business.
Webinar: Cybersecurity Policy Development
A strong and talented security team alone cannot protect an organization from today’s cyber risk as it is the people. Strong cybersecurity policies should be defined and enforced in every organization.
Fighting Back Fast: Artificial Intelligence Comes to Cybersecurity
Recently, more than $240,000 was stolen by someone pretending to be an executive at a British energy company. This event does not seem all that out of the ordinary, except that the executive was not a real person. Thieves used voice-mimicking software in order to imitate the real executive. And they got away with it. This scam was enabled by artificial intelligence (AI) that was used to create a realistic deep-fake imitation. It is being called the world’s first AI heist.