News & Analysis as of

Risk Mitigation Software Data Protection

Pillsbury - Global Sourcing Practice

The UK Government Announces Ambitious Proposals to Improve Software Security and Resilience

In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more

NAVEX

Don't Be the Weakest Link – Your Team's Crucial Role in Cybersecurity

NAVEX on

Cybersecurity success depends on more than just technology. As we’ve seen in part one and part two of this series on cybersecurity risk, the costs of a cyber attack are high – and bad actors always look for the easiest entry...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Planet Depos, LLC

Protecting your Law Firm against Ransomware Attacks

Planet Depos, LLC on

Have you heard of ransomware? It is a term often in the news. Ransomware is a type of malware. For those who have heard of it but don’t know what exactly it is, malware is a type of software that is designed to disrupt,...more

Fisher Phillips

Combatting Corporate Espionage In The Digital Age

Fisher Phillips on

In the modern age of relatively cheap and ever-evolving technology, corporate espionage is a real threat that could be perpetrated by any employee or other insider at any time. The term “corporate espionage” covers many...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide