Automating Policy Enforcement in an Era of Regulatory Expansion
In its latest policy paper, Evolver describes an innovative method for meeting the latest increase in regulatory requirements by building in policy enforcement through existing tools and applications.
Four Considerations When Navigating the Constantly Evolving Landscape of eDiscovery
Sophistication in office technology brings great convenience, but also increases complexity in the realm of eDiscovery, particularly when determining where to host sensitive data.
Protecting Data to Avoid the Next MOVEIt Attack
In today’s interconnected digital landscape, decision makers face an ever-increasing risk of data theft and security breaches. Safeguarding valuable data has become a paramount concern for organizations of all sizes.
Webinar: Data Protection’s New Landscape and Thinking Beyond Network & Device Security
Decision makers face an ever-increasing risk of data theft and security breaches. Join us for an information session delving into data security protection and cyber risk.
Key Data Compliance Questions for Lawyers Taking on M&A Cases
As the process of organizing data ahead of M&A becomes more digitized, there are several key questions a firm will be challenged to address when considering data in particular. Here are five of the most crucial as defined by our Evolver Legal Services experts.
Updated: Is Your Company Hiring in Russia Without Knowing It? – LinkedIn Job Postings and the Associated Cyber Risk
Evolver discovered a major issue with the popular professional social network that could represent a major brand protection and potentially a cyber issue for companies around the world. Via LinkedIn’s job posting feature, companies are being changed or intermingled with Russian companies and translated into Russian.
Technology and the Cyber Insurance Industry: A Follow-Up
Evolver has been keeping up to date with trends in cyber insurance predicted or inferred from the research in our original 2015 whitepaper that received considerable coverage when released. Some of the predictions in the paper occurred soon after the paper’s release while other predictions are in different stages of development.
GDPR Resources and Insights: The Race to Comply
As the European Union heads toward the implement of the General Data Protection Regulation (GDPR) on May 25, companies of all sizes are preparing to comply with one of the broadest mandates in the history of digital regulation.
Hospitals and Healthcare Clinics are under cyber attack – are you prepared?
From Orangeworm’s targeted attack on MRI machines where the Trojan collects information about the host system, to the recent documented vulnerabilities on Phillips CT Scanners where they could be exploited by an attacker to steal protected health information (PHI) and other sensitive data files, there is no denying cyber attacks in the healthcare industry are on the rise.
Reflections on the SEC’s Cybersecurity Guidance: The Rise of the Investor in the Discussion
As the cybersecurity world undergoes a major shift toward quantifying potential losses to a company, the SEC has weighed in with guidance that will compel some of the world’s largest companies to re-evaluate how they asses cyber risk.