News & Analysis as of

Incident Response Plans Corporate Counsel Phishing Scams

Morgan Lewis - Tech & Sourcing

Key Takeaways from the CrowdStrike Global Threat Report 2025

Published in August 2025, the CrowdStrike Global Threat Report 2025 provides a detailed overview of the evolving cyber threat landscape, drawing on data from millions of endpoints and cloud workloads worldwide....more

Davis Wright Tremaine LLP

Litigation Preparedness Following a Data Breach: Three Tips to Consider During the Incident Response Period

Data breaches come in many different forms, sizes, and levels of complexity, but they tend to share certain key facts: A third-party bad actor—whether through a phishing attack, a ransomware attack, exploitation of a zero-day...more

Miles & Stockbridge P.C.

Avoid Turning One Data Breach into Two

When can a data breach get worse? When the process of notifying victims creates a second breach. Take the example of a cancer treatment center that recently paid $425,000 to settle allegations that included a faulty...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide