Im Fokus: Die IT-Agenda 2026 gestalten – CSO Online
– Read More
Ein Tag im Leben eines Sicherheitsentscheiders… Dudarau Dzmitry | shutterstock.com Wenn es um Security-Budgets geht, dreht sich ein Großteil der (Online-)Diskussionen darum, wie man das “Board” für sich gewinnt und…
loading=”lazy” width=”400px”>Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind. Gorodenkoff – shutterstock.com Cyberangriffe fordern nicht nur CISOs in punkto Prävention und Krisenbewältigung heraus. Auch die Unternehmenskommunikation ist mit im…
The Solicitors Regulation Authority has been ordered to pay a solicitor nearly £160,000 in costs after its prosecution of her was ruled “fatally flawed”. The post SRA to pay solicitor…
The Advertising Standards Authority has banned misleading adverts aimed at victims of car accidents as part of a new crackdown on claims management companies. The post Advertising watchdog targets motor…
The Ministry of Justice should consider changing its name to “the Ministry of Justice (for Certain People)” if it does not take sustainability of legal aid more seriously, MPs have…
The SRA has released its 2024-25 anti-money laundering report and the scale of supervision is striking – it carried out 935 proactive engagements in the year to 5 April 2025.…
A Dutch-style “high trust” model for legal aid could “significantly reduce bureaucracy” for law firms and make it more “economic” for them to do publicly funded work, MPs were told…
Key Quotes: “The incentives aren’t aligned, in my opinion, with liability caps. It just begs the other side… to maybe engage in some shenanigans with the data because the penalty…
Hello Fellow Nerds, Welcome to the second edition of From the Founder, where I give you the unfiltered, behind-the-scenes updates on Contract Nerds post-acquisition. If you missed the announcement, you…
Scattered Lapsus$ Hunters, also known as ShinyHunters, were drawn in using a realistic, yet mostly fake, dataset. – Read More
Cybersecurity researchers have discovered two new malicious extensions on the Chrome Web Store that are designed to exfiltrate OpenAI ChatGPT and DeepSeek conversations alongside browsing data to servers under the…
Threat actors are using the social engineering technique and a legitimate Microsoft tool to deploy the DCRat remote access Trojan against targets in the hospitality sector. – Read More
The start of 2026 has brought news of a welcome series of female leadership appointments and promotions in the legal tech arena, including a new chief operating officer at Harvey;…
The CERT Coordination Center (CERT/CC) has disclosed details of an unpatched security flaw impacting TOTOLINK EX200 wireless range extender that could allow a remote authenticated attacker to gain full control…