
Cybersecurity Due Diligence & Vendor Risk Assessments: A Guide
In May 2025, athletic apparel giant Adidas fell victim to a vendor data breach, exposing a harsh reality of modern cybersecurity: a company's security is only as strong as...
Cybersecurity Due Diligence & Vendor Risk Assessments: A Guide
In May 2025, athletic apparel giant Adidas fell victim to a vendor data breach, exposing a harsh reality of modern cybersecurity: a company's security is only as strong as...
Should I Outsource Cybersecurity?
Many organizations are turning to outside cybersecurity experts to protect their digital assets. But is outsourced cybersecurity the right choice for your business? Keep reading to learn what cybersecurity...
How Much is Your Employees’ Time Truly Worth? Calculating Cost, Productivity & ROI
Understaffed organizations. Employee burnout. Stagnant HR budgets. Technology challenges. All are daily realities for businesses in 2025. That's the word from the Society for Human Resource Management (SHRM) in...
Navigating the New NIST Incident Response Lifecycle: A Holistic Approach
Cyber incidents are escalating in frequency, sophistication, and impact, affecting everything from patient safety to city operations. In this environment, incident response can't be an isolated IT task. It...
Lessons from Oracle’s 2025 Data Breach: A Guide to Regulatory Compliance and Crisis Response
With data breaches happening more frequently, the way an organization responds matters just as much as preventing them in the first place. Case in point, Oracle's recent data breach and...
Blueprint for Security: Crafting a Cybersecurity Plan for AEC Firms
While cyber-attacks are hitting every industry hard, the architecture, engineering, and construction (AEC) industry faces special challenges. "It’s not one neatly organized server room in one building,” Jamin Valdez, a...
AI in Cybersecurity: 2025 & Beyond
John Christly remembers the days, not long ago, when thwarting a cyberattack meant hours of manual investigation—piecing together digital breadcrumbs across endless log files. "It used to take a human...
The Future of AEC: Trends Defining 2025
The architecture, engineering, and construction sector is on a promising path forward. For one thing, according to ConstructConnect’s February 2025 Project Stress Index, construction project abandonments dropped 14.7% in...
The Ethical Implications of Generative AI in Legal Practices: What You Need to Know
A transformative shift is underway in professional services, driven by artificial intelligence. As just one indication, over three-quarters of the professionals surveyed (77%) for the latest Thomson Reuters Future...
Adapting to Change: How Law Firms Can Leverage AI, Data, and Hybrid Work in 2025
The legal industry is in a transformative moment. With 83% of law firm leaders enacting hybrid work policies and artificial intelligence reshaping traditional workflows, law firms face unprecedented pressure...
The Intersection of Law and Technology: Key Trends Lawyers Need to Watch in 2025
The legal profession may not be known for adopting cutting-edge tech, but appearances can be deceiving. In fact, law firms are adopting tech as quickly as any other industry....
AI Ethics for SMBs: What the Latest International Standards Mean for Your Business
Under the EU's General Data Protection Regulation (GDPR), which went into effect in 2018, organizations must properly secure and manage personal data. Failure to do so may result in...
Cybersecurity Risks in Medical Devices: Addressing the Challenges
In early 2025, the Cybersecurity and Infrastructure Security Agency (CISA) announced that it had found serious vulnerabilities in patient monitors made by a Chinese medical device company. The agency's analysis...
Safeguarding Telemedicine: Strategies to Prevent Cyberattacks
Despite a brief post-pandemic dip, telemedicine continues to grow rapidly. One estimate predicts it will account for up to 30% of all healthcare visits by 2026. It seems clear that...
HIPAA Security Rule is about to get an upgrade!
In the past five years, the Office for Civil Rights (OCR) has observed a staggering rise in reports of large data breaches (those affecting 500 or more records). The number...
Ransomware Risks for Food & Beverage: Key Lessons from Recent Attacks
In November 2023, a Swiss farmer watched helplessly as a hacker breached a milking robot and encrypted vital data about his herd of cows. The attack ultimately resulted in...
Farm to Firewall: How Food & Agriculture Businesses Can Defend Against Modern Cyber Threats
Sadly, it's come to this: the food on your table could be the next target for cybercriminals. That's because the agriculture and food production sector has come under increasing...
Cybersecurity Best Practices for Food & Beverage Companies
Food and beverage companies face a unique cybersecurity challenge. They must manage increasing digital connectivity and rising cyber threats–along with their peers in other industries–while at the same time...
The Rise of Hyperautomation: What You Need to Know
It’s a fact: traditional security orchestration, automation, and response (SOAR) tools struggle to keep pace with accelerating cybersecurity threats. As just a sampling of the threats facing businesses today, nearly...
Managing the Growing Challenge of Ignored SOC Alerts
Security operations centers (SOCs) face mounting pressure to protect organizations from cyber threats, yet a disturbing trend has emerged: the majority of security alerts are ignored. This growing challenge...
Key Takeaways from the 2024 RSM Middle Market Business Index on Cybersecurity
In the ever-evolving landscape of cybersecurity, understanding the challenges, solutions, and opportunities is crucial for businesses of all sizes. The ninth edition of the RSM Middle Market Business Index...
The Rising Ransomware Threat: Why 24/7 Security Operations are No Longer Optional
Malwarebytes recently released its “ThreatDown 2024 State of Ransomware” report, and the news isn’t good. Ransomware is on the rise; in 2023, attacks on US businesses surged by 63%...
MFA Bypass Attacks: What SMBs Need to Know
Multi-factor authentication (MFA) bypass attacks — once only available to highly sophisticated hacker teams with advanced tools — are now available to anyone with a nefarious idea and a...
100 Million Patient Records at Risk: Lessons from the Change Healthcare Breach
Earlier this year, the United Health/Change Healthcare data breach impacted approximately 100 million Americans, making it the largest cybersecurity incident in US healthcare history. Overview of the United Health Data...
The Healthcare Cybersecurity Paradox: Why Increased Spending Isn’t Enough
Healthcare organizations face a cybersecurity paradox: despite record-breaking security investments, cyberattacks continue to plague the industry. And as healthcare providers scramble to strengthen their digital defenses, cybercriminals are evolving...
Understanding and Preventing Ransomware Attacks in Healthcare
Healthcare organizations are under attack in 2024, with cybercriminals compromising the sensitive medical data of more than 14 million US patients. And ransomware — a kind of attack where...
Cyber Threats and Regulatory Changes: What Organizations Need to Know
A recent in-person event (simulcast as a webinar) brought together cybersecurity experts to discuss emerging threats and upcoming regulatory changes affecting organizations. Litigation partner Charu Chandrasekhar from Debevoise &...
Cybersecurity in 2024: Important Insights from Verizon and IBM Reports
Knowledge is power — especially when it comes to cybersecurity. Verizon's 17th annual Data Breach Investigations Report (DBIR) and IBM's 19th annual Cost of a Data Breach report provide...
Cyber Insurance: What You Need to Know
The recent CrowdStrike incident, which affected millions of systems worldwide and caused billions in damages, illustrates the unpredictable nature of IT-related risks. These days, having the right cyber insurance...