You do not have permission to access this page or your session has expired.

If you get this page on the first page you go to after logging in to site, you probably have cookies disabled.

Cookies must be enabled to use this site (see How to Enable Cookies).

 

Product

Articles

Insider Sabotage: Preventing Kill Switch Attacks In Corporate Networks?

We comment on how retaliatory "kill switch" and logic-bomb attacks by trusted insiders are treated as intentional cyber sabotage under federal law. Learn how to reduce the risk.

Residual Annuities And The High Cost Of Miscalculated Lump Sums?

An employer settles an ERISA claim for hundreds of millions. We examine how misapplied residual annuity formulas and actuarial assumptions can trigger systemic underpayments and litigation.

Is Ghost Growth Real Or Imaginary? You Make The Call

What is ghost growth and is it an issue? You make the call and join the conversation.

Protecting Patient Privacy In The Age Of Online Tracking Technologies

We explore how a hospital's use of tracking pixels led to a privacy class action and outline steps to take to reduce similar legal, financial, and reputational risks.

Guarding The Inbox: How Employers Can Shut Down Spoofing Risks

We examine how email spoofing enables high-value business fraud and outline training topics employers can use to help prevent loss or compromise from spoofing.