Clarifying ‘man’ and ‘woman’ under the Equality Act 2010 – Legal Futures
By Robert Taylor, CEO and General Counsel at Legal Futures Associate 360 Law Services In April 2025, the UK Supreme Court handed down a landmark judgment in For Women Scotland…
By Robert Taylor, CEO and General Counsel at Legal Futures Associate 360 Law Services In April 2025, the UK Supreme Court handed down a landmark judgment in For Women Scotland…
You check that the windows are shut before leaving home. Return to the kitchen to verify that the oven and stove were definitely turned off. Maybe even circle back again…
Cybersecurity researchers have disclosed a new Android trojan called PhantomCard that abuses near-field communication (NFC) to conduct relay attacks for facilitating fraudulent transactions in attacks targeting banking customers in Brazil.…
The gap between the rate of social and affordable housing change versus non-working population change is the largest since 2019, widening 173% in a year The post Affordable Housing Gap:…
Actionstep has established a dedicated AI Center of Excellence, incorporating AI expertise, AI best practices for law firm management and a future-focused roadmap with AI functionality woven throughout. The post…
Congrats! TikTok is buzzing this morning as Gen Z school leavers share the moment they discovered whether their A-Level results had secured them a place at their dream law school.…
Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks before they start, and the best defense may come down to the settings you choose on day one. In…
Turnover up 3% and 4.7% respectively Eversheds Sutherland and Pinsent Masons have both grown revenues in the past financial year, with Eversheds up 3% to £768.7 million and Pinsents rising…
Hoarding work, chasing quick wins and pitching solo A top lawyer has likened the internal politics of some City law firms to “something resembling the Hunger Games”, warning that an…
I’ve been thinking a lot about SOC efficacy lately, and I’m going to take a position that might make some people uncomfortable. Despite organizations investing millions in security operations centres…
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?quality=50&strip=all 6562w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/08/ymgerman_shutterstock_1022739901_16z9_NR.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”auto, (max-width: 1024px) 100vw, 1024px”>Bestimmte Implementierungen…
Google said it’s implementing a new policy requiring developers of cryptocurrency exchanges and wallets to obtain government licenses before publishing apps in 15 jurisdictions in order to “ensure a safe…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. N-able…
DPRK hackers are throwing every kind of malware at the wall and seeing what sticks, deploying stealers, backdoors, and ransomware all at once. – Read More
It is a “uniquely arrogant and complacent facet” of law firms that partners think some key business functions are “dispensible” support staff rather than core elements. The post Law firms…