Latest Posts › Ransomware

Share:

Understanding the Additional Risks When Making a Ransomware Payment [Video]

Ken Fishkin talks to Doreen M. Edelman and Christian C. Contardo of the firm’s Global Trade & National Security practice, about ransomware and the risks of making payments when data is held for ransom, such as exposure to...more

Cyber Insurance Changes in the Aftermath of Log4j [Video]

In this episode of Lowenstein’s Cybersecurity Awareness series, Ken Fishkin, Lowenstein’s Manager of Information Security, speaks with Lynda A. Bennett, Chair of the firm’s Insurance Recovery Group, about the impact of...more

The Flaw in Log4j and How It Can Impact Your Business [Video]

A major vulnerability (known as Log4j or Logshell) within Java-based applications is impacting millions of applications around the world. This issue affects most industries and is very dangerous if applications are not...more

How to Prepare for a Cybersecurity Breach [Video]

In the second session in our Cybersecurity Awareness Series, learn the ins and outs of preparing your organization’s staff for a potentially damaging situation–whether created by accident or by a malicious outsider–by running...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide