The $26 Hack That Should Terrify Every Law Firm
What the Pentagon’s Unencrypted Predator Drone Teaches Attorneys About Privilege, Cyber Hygiene, and the Principle of Least Privilege
What the Pentagon’s Unencrypted Predator Drone Teaches Attorneys About Privilege, Cyber Hygiene, and the Principle of Least Privilege
Three AI companies. A due diligence framework for the vendor supply
In 2007, a close friend and former Intel process engineer got a call from his manager. Intel was building Fab 68 in Dalian, China.
Every person on that video call was an AI-generated deepfake.
When I was at Dell EMC in the early 2010s, we sold enterprise storage to companies that had no idea what they were storing.
unevenly. Here’s an 18-month pilot framework for building real
Lawyers lack business training. The result: a \$8.58-per-click Vegas
money. Here’s what ABA Model Rules, state laws, and SEC v. Covington
one phishing email. Supply chain attacks threaten law firms the same
documentation gaps and misrepresented controls. Here’s what law firms