<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<?xml-stylesheet type="text/xsl" href="https://feeds.feedblitz.com/feedblitz_rss.xslt"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sailthru="http://www.sailthru.com/rss-extension" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0"><channel><link>https://www.lawjournalnewsletters.com/</link><title>LJN - Cybersecurity Law &amp; Strategy</title><description>ALM: Media, Intelligence and Events - working together to empower our audiences and partners to discover, connect and compete.</description><atom:link href="https://www.lawjournalnewsletters.com/" rel="self" type="application/rss+xml"/>
<meta xmlns="http://www.w3.org/1999/xhtml" name="robots" content="noindex" />
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/</feedburner:origLink><title>Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</title><link>https://feeds.feedblitz.com/~/952821125/0/ljn/cybersecurity-law-and-strategy~Key-Takeaways-from-Legalweek-On-Prompting-Context-and-Agents/</link><guid>http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/</guid><pubDate>Wed, 01 Apr 2026 13:23:05 EST</pubDate><description><![CDATA[An annual tradition continues as we present the responses to our Legalweek question. For 2026, it was "where are we with prompting"?<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952821125/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952821125/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f413%2f2023%2f11%2fChat-GPT-Article-202307181246.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952821125/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952821125/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952821125/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/">Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/why-one-law-firm-is-bucking-the-tide-and-prohibiting-gen-ai-for-research-and-writing/">Why One Law Firm Is Bucking the Tide and Prohibiting Gen AI for Research and Writing</a></li></ul>&#160;</div>]]>
</description><category>artificial intelligence</category><category>e-discovery</category><category>legal technology</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Steve Salkin</thename><imageURL>https://feeds.feedblitz.com/-/952821122/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/E-Discovery/Legal Technology/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/952821122/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/952821122/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>Steve Salkin</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|E-Discovery|Legal Technology|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>E-Discovery</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/952821122/0/ljn/cybersecurity-law-and-strategy.jpg,620,372</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/952821122/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620">https://feeds.feedblitz.com/-/952821122/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="372">372</sailthru:image1_height><sailthru:image1_width width="620">620</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/413/2023/11/Chat-GPT-Article-202307181246.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>An annual tradition continues as we present the responses to our Legalweek question. For 2026, it was "where are we with prompting"?</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952821125/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952821125/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952821125/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f413%2f2023%2f11%2fChat-GPT-Article-202307181246.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952821125/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952821125/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952821125/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/">Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/why-one-law-firm-is-bucking-the-tide-and-prohibiting-gen-ai-for-research-and-writing/">Why One Law Firm Is Bucking the Tide and Prohibiting Gen AI for Research and Writing</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/04/01/matthew-mcconaughey-combats-ais-unauthorized-use-of-his-voice-and-likeness/</feedburner:origLink><title>Matthew McConaughey Combats AI's Unauthorized Use of His Voice and Likeness</title><link>https://feeds.feedblitz.com/~/952666895/0/ljn/cybersecurity-law-and-strategy~Matthew-McConaughey-Combats-AIs-Unauthorized-Use-of-His-Voice-and-Likeness/</link><guid>http://www.lawjournalnewsletters.com/2026/04/01/matthew-mcconaughey-combats-ais-unauthorized-use-of-his-voice-and-likeness/</guid><pubDate>Wed, 01 Apr 2026 01:07:01 EST</pubDate><description><![CDATA[Matthew McConaughey secured eight federal trademark registrations covering his voice and iconic catchphrases in a novel legal strategy aimed at combating AI's unauthorized use of his voice and likeness. The move signals an important evolution in the power dynamics between talent/brands and the companies providing generative AI tools.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952666895/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952666895/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f28%2f50%2f5fd56963417489180919559699e1%2fmatthew-mcconaughey.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952666895/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952666895/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952666895/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li></ul>&#160;</div>]]>
</description><category>artificial intelligence</category><category>privacy</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Robert Botkin and Traci Bransford and Shayla Wright and Eva Frongello and Caroline McCracken</thename><imageURL>https://feeds.feedblitz.com/-/952666892/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Privacy/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/952666892/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/952666892/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>Robert Botkin and Traci Bransford and Shayla Wright and Eva Frongello and Caroline McCracken</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Privacy|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Privacy</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/952666892/0/ljn/cybersecurity-law-and-strategy.jpg,620,372</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/952666892/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620">https://feeds.feedblitz.com/-/952666892/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="372">372</sailthru:image1_height><sailthru:image1_width width="620">620</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/28/50/5fd56963417489180919559699e1/matthew-mcconaughey.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>Matthew McConaughey secured eight federal trademark registrations covering his voice and iconic catchphrases in a novel legal strategy aimed at combating AI's unauthorized use of his voice and likeness. The move signals an important evolution in the power dynamics between talent/brands and the companies providing generative AI tools.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952666895/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952666895/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952666895/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f28%2f50%2f5fd56963417489180919559699e1%2fmatthew-mcconaughey.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952666895/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952666895/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952666895/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/</feedburner:origLink><title>When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</title><link>https://feeds.feedblitz.com/~/952655945/0/ljn/cybersecurity-law-and-strategy~When-AI-Gets-It-Wrong-Managing-the-Legal-Risk-of-Hallucinations-in-Business-DecisionMaking/</link><guid>http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/</guid><pubDate>Wed, 01 Apr 2026 00:16:59 EST</pubDate><description><![CDATA[The use of AI does not alter fundamental obligations of accuracy, reasonableness and accountability. The legal risk lies not in the existence of hallucinations but in the failure to govern and verify them.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952655945/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952655945/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f79%2f7f%2fca835f8a4987a0ec97594390f8a2%2fai-hallucinations-jpeg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952655945/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952655945/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952655945/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/">Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/why-one-law-firm-is-bucking-the-tide-and-prohibiting-gen-ai-for-research-and-writing/">Why One Law Firm Is Bucking the Tide and Prohibiting Gen AI for Research and Writing</a></li></ul>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity</category><category>legal technology</category><category>cover story cybersecurity law &amp; strategy</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Kevin Szczepanski</thename><imageURL>https://feeds.feedblitz.com/-/946252535/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity/Legal Technology/Cover Story Cybersecurity Law &amp; Strategy/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/946252535/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/946252535/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>Kevin Szczepanski</sailthru:byline><sailthru:channel_list>Topics|Cover Story|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity|Legal Technology|Cover Story Cybersecurity Law &amp; Strategy|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/946252535/0/ljn/cybersecurity-law-and-strategy.jpg,767,505</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/946252535/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767">https://feeds.feedblitz.com/-/946252535/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="505">505</sailthru:image1_height><sailthru:image1_width width="767">767</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/79/7f/ca835f8a4987a0ec97594390f8a2/ai-hallucinations-jpeg767x505.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>The use of AI does not alter fundamental obligations of accuracy, reasonableness and accountability. The legal risk lies not in the existence of hallucinations but in the failure to govern and verify them.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952655945/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952655945/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952655945/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f79%2f7f%2fca835f8a4987a0ec97594390f8a2%2fai-hallucinations-jpeg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952655945/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952655945/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952655945/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/">Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/why-one-law-firm-is-bucking-the-tide-and-prohibiting-gen-ai-for-research-and-writing/">Why One Law Firm Is Bucking the Tide and Prohibiting Gen AI for Research and Writing</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/04/01/supreme-court-unanimously-rejects-effort-to-hold-isps-liable-for-customers-copyright-infringement/</feedburner:origLink><title>Supreme Court Unanimously Rejects Effort to Hold ISPs Liable for Customers' Copyright Infringement</title><link>https://feeds.feedblitz.com/~/952655948/0/ljn/cybersecurity-law-and-strategy~Supreme-Court-Unanimously-Rejects-Effort-to-Hold-ISPs-Liable-for-Customers-Copyright-Infringement/</link><guid>http://www.lawjournalnewsletters.com/2026/04/01/supreme-court-unanimously-rejects-effort-to-hold-isps-liable-for-customers-copyright-infringement/</guid><pubDate>Wed, 01 Apr 2026 00:14:59 EST</pubDate><description><![CDATA[The Court held that intent is required and that mere awareness of infringement does not establish secondary liability.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952655948/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952655948/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f45%2ff2%2fd2063d574d8abf84d3bb5aa1e918%2foffshore-disputes.jpeg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952655948/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952655948/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952655948/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li></ul>&#160;</div>]]>
</description><category>copyrights</category><category>cybersecurity</category><category>internet law</category><category>legal technology</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Benjamin West Janke and Ashley E. White and Jeremy D. Ray and Scott Johnson</thename><imageURL>https://feeds.feedblitz.com/-/952484096/0/ljn/cybersecurity-law-and-strategy.jpeg</imageURL><thepracticearea>Copyrights/Cybersecurity/Internet Law/Legal Technology/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/952484096/0/ljn/cybersecurity-law-and-strategy.jpeg"><media:thumbnail url="https://feeds.feedblitz.com/-/952484096/0/ljn/cybersecurity-law-and-strategy.jpeg" height="2819" width="4282"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>Benjamin West Janke and Ashley E. White and Jeremy D. Ray and Scott Johnson</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Copyrights|Cybersecurity|Internet Law|Legal Technology|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Copyrights</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Internet Law</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/952484096/0/ljn/cybersecurity-law-and-strategy.jpeg,4282,2819</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/952484096/0/ljn/cybersecurity-law-and-strategy.jpeg" height="2819" width="4282">https://feeds.feedblitz.com/-/952484096/0/ljn/cybersecurity-law-and-strategy.jpeg</sailthru:image1><sailthru:image1_height height="2819">2819</sailthru:image1_height><sailthru:image1_width width="4282">4282</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/45/f2/d2063d574d8abf84d3bb5aa1e918/offshore-disputes.jpeg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>The Court held that intent is required and that mere awareness of infringement does not establish secondary liability.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952655948/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952655948/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952655948/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f45%2ff2%2fd2063d574d8abf84d3bb5aa1e918%2foffshore-disputes.jpeg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952655948/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952655948/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952655948/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/</feedburner:origLink><title>Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</title><link>https://feeds.feedblitz.com/~/952665185/0/ljn/cybersecurity-law-and-strategy~Beyond-Breaches-The-Rise-of-NonBreach-Privacy-Claims-in-Cyber-Insurance/</link><guid>http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/</guid><pubDate>Wed, 01 Apr 2026 00:12:59 EST</pubDate><description><![CDATA[The cyber insurance industry has long been dominated by conversations around security threats. Privacy concerns were often treated as an afterthought. But recently, there has been a critical shift: privacy risks that arise outside of traditional breaches are now front and center.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952665185/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952665185/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f414%2f2018%2f03%2fCyber-Insurance-Article-201712111843.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952665185/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952665185/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952665185/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/matthew-mcconaughey-combats-ais-unauthorized-use-of-his-voice-and-likeness/">Matthew McConaughey Combats AI's Unauthorized Use of His Voice and Likeness</a></li></ul>&#160;</div>]]>
</description><category>insurance law</category><category>cybersecurity</category><category>legal technology</category><category>privacy</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Blake Feldman</thename><imageURL>https://feeds.feedblitz.com/-/952654115/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Insurance Law/Cybersecurity/Legal Technology/Privacy/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/952654115/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/952654115/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>Blake Feldman</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Insurance Law|Cybersecurity|Legal Technology|Privacy|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Insurance Law</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:topic>Privacy</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/952654115/0/ljn/cybersecurity-law-and-strategy.jpg,620,372</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/952654115/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620">https://feeds.feedblitz.com/-/952654115/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="372">372</sailthru:image1_height><sailthru:image1_width width="620">620</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/414/2018/03/Cyber-Insurance-Article-201712111843.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>The cyber insurance industry has long been dominated by conversations around security threats. Privacy concerns were often treated as an afterthought. But recently, there has been a critical shift: privacy risks that arise outside of traditional breaches are now front and center.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952665185/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952665185/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952665185/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f414%2f2018%2f03%2fCyber-Insurance-Article-201712111843.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952665185/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952665185/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952665185/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/matthew-mcconaughey-combats-ais-unauthorized-use-of-his-voice-and-likeness/">Matthew McConaughey Combats AI's Unauthorized Use of His Voice and Likeness</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/</feedburner:origLink><title>Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</title><link>https://feeds.feedblitz.com/~/952654121/0/ljn/cybersecurity-law-and-strategy~Anthropic-and-Law-Firms-That-Fought-Back-Against-Trump-Administration-Got-Rewarded/</link><guid>http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/</guid><pubDate>Wed, 01 Apr 2026 00:08:59 EST</pubDate><description><![CDATA[In categories where products are difficult to differentiate on performance, and that describes most of the AI industry today, customers do not choose on features. They choose on trust. They are selecting a company they believe will honor its commitments. Brand integrity, in those markets, is a material business asset.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952654121/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952654121/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2fd4%2fee%2fdc1baa914763802ed32cf23abf44%2fai-product-claude-428413607-jpg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952654121/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952654121/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952654121/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/matthew-mcconaughey-combats-ais-unauthorized-use-of-his-voice-and-likeness/">Matthew McConaughey Combats AI's Unauthorized Use of His Voice and Likeness</a></li></ul>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity law &amp; strategy</category><category>legal technology</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Allen Adamson</thename><imageURL>https://feeds.feedblitz.com/-/949853741/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity Law &amp; Strategy/Legal Technology/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/949853741/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/949853741/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>Allen Adamson</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity Law &amp; Strategy|Legal Technology|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/949853741/0/ljn/cybersecurity-law-and-strategy.jpg,767,505</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/949853741/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767">https://feeds.feedblitz.com/-/949853741/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="505">505</sailthru:image1_height><sailthru:image1_width width="767">767</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/d4/ee/dc1baa914763802ed32cf23abf44/ai-product-claude-428413607-jpg767x505.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>In categories where products are difficult to differentiate on performance, and that describes most of the AI industry today, customers do not choose on features. They choose on trust. They are selecting a company they believe will honor its commitments. Brand integrity, in those markets, is a material business asset.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952654121/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952654121/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952654121/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2fd4%2fee%2fdc1baa914763802ed32cf23abf44%2fai-product-claude-428413607-jpg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952654121/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952654121/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952654121/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/matthew-mcconaughey-combats-ais-unauthorized-use-of-his-voice-and-likeness/">Matthew McConaughey Combats AI's Unauthorized Use of His Voice and Likeness</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/04/01/the-impact-and-risks-of-vibe-lawyering/</feedburner:origLink><title>The Impact and Risks of &amp;lsquo;Vibe Lawyering'</title><link>https://feeds.feedblitz.com/~/952653998/0/ljn/cybersecurity-law-and-strategy~The-Impact-and-Risks-of-lsquoVibe-Lawyering/</link><guid>http://www.lawjournalnewsletters.com/2026/04/01/the-impact-and-risks-of-vibe-lawyering/</guid><pubDate>Wed, 01 Apr 2026 00:06:59 EST</pubDate><description><![CDATA[Until recently, little focus has been placed on the impact of &ldquo;vibe lawyering,  <i>i.e</i>., non-lawyers, including clients, using AI to conduct their own analysis of a legal issue, either before, after, or instead of consulting with counsel. Two recent federal court decisions highlight the risks of vibe lawyering beyond the issue of hallucinated citations and indicate potential benefits to both lawyers and <i>pro se</i> litigants in relation to the use of AI.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952653998/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952653998/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2fae%2f51%2fb8d0518c4aeca829cf5d9be2ae9a%2fai-backed-legal-research-jpeg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952653998/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952653998/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952653998/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/">Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</a></li></ul>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity law &amp; strategy</category><category>legal technology</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>F. Paul Greene and Michael-Anthony Bou Jaoude</thename><imageURL>https://feeds.feedblitz.com/-/924634130/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity Law &amp; Strategy/Legal Technology/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/924634130/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/924634130/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>F. Paul Greene and Michael-Anthony Bou Jaoude</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity Law &amp; Strategy|Legal Technology|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/924634130/0/ljn/cybersecurity-law-and-strategy.jpg,767,505</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/924634130/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767">https://feeds.feedblitz.com/-/924634130/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="505">505</sailthru:image1_height><sailthru:image1_width width="767">767</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/ae/51/b8d0518c4aeca829cf5d9be2ae9a/ai-backed-legal-research-jpeg767x505.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[Until recently, little focus has been placed on the impact of &ldquo;vibe lawyering,  <i>i.e</i>., non-lawyers, including clients, using AI to conduct their own analysis of a legal issue, either before, after, or instead of consulting with counsel. Two recent federal court decisions highlight the risks of vibe lawyering beyond the issue of hallucinated citations and indicate potential benefits to both lawyers and <i>pro se</i> litigants in relation to the use of AI.<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952653998/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952653998/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952653998/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2fae%2f51%2fb8d0518c4aeca829cf5d9be2ae9a%2fai-backed-legal-research-jpeg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952653998/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952653998/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952653998/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/">Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/04/01/why-one-law-firm-is-bucking-the-tide-and-prohibiting-gen-ai-for-research-and-writing/</feedburner:origLink><title>Why One Law Firm Is Bucking the Tide and Prohibiting Gen AI for Research and Writing</title><link>https://feeds.feedblitz.com/~/952654001/0/ljn/cybersecurity-law-and-strategy~Why-One-Law-Firm-Is-Bucking-the-Tide-and-Prohibiting-Gen-AI-for-Research-and-Writing/</link><guid>http://www.lawjournalnewsletters.com/2026/04/01/why-one-law-firm-is-bucking-the-tide-and-prohibiting-gen-ai-for-research-and-writing/</guid><pubDate>Wed, 01 Apr 2026 00:04:59 EST</pubDate><description><![CDATA[Lawyers gain their strength and effectiveness from hard work. We have not been able to persuade ourselves that the so-called shortcut of prompting a machine to produce a more believable answer is a good thing, if it robs the product, the client, the court, and the lawyer's reputation of the benefit of immersive research into the facts, policies, goals, and history of the problem and the present state of the law.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952654001/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952654001/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f3e%2f33%2f4594a73a4f5ebd4d03b50992eaf5%2fcontrolling-ai-jpg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952654001/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952654001/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952654001/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/">Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</a></li></ul>&#160;</div>]]>
</description><category>artificial intelligence</category><category>legal technology</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Peter J. Winders</thename><imageURL>https://feeds.feedblitz.com/-/948432023/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Legal Technology/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/948432023/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/948432023/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>Peter J. Winders</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Legal Technology|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/948432023/0/ljn/cybersecurity-law-and-strategy.jpg,767,505</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/948432023/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767">https://feeds.feedblitz.com/-/948432023/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="505">505</sailthru:image1_height><sailthru:image1_width width="767">767</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/3e/33/4594a73a4f5ebd4d03b50992eaf5/controlling-ai-jpg767x505.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>Lawyers gain their strength and effectiveness from hard work. We have not been able to persuade ourselves that the so-called shortcut of prompting a machine to produce a more believable answer is a good thing, if it robs the product, the client, the court, and the lawyer's reputation of the benefit of immersive research into the facts, policies, goals, and history of the problem and the present state of the law.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952654001/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952654001/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952654001/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f3e%2f33%2f4594a73a4f5ebd4d03b50992eaf5%2fcontrolling-ai-jpg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952654001/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952654001/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952654001/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/when-ai-gets-it-wrong-managing-the-legal-risk-of-hallucinations-in-business-decision-making/">When AI Gets It Wrong: Managing the Legal Risk of Hallucinations in Business Decision-Making</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/anthropic-and-law-firms-that-fought-back-against-trump-administration-got-rewarded/">Anthropic and Law Firms That Fought Back Against Trump Administration Got Rewarded</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/04/01/sec-and-cftc-guidance-provides-regulatory-clarity-to-crypto-experts-say/</feedburner:origLink><title>SEC and CFTC Guidance Provides Regulatory Clarity to Crypto, Experts Say</title><link>https://feeds.feedblitz.com/~/952654004/0/ljn/cybersecurity-law-and-strategy~SEC-and-CFTC-Guidance-Provides-Regulatory-Clarity-to-Crypto-Experts-Say/</link><guid>http://www.lawjournalnewsletters.com/2026/04/01/sec-and-cftc-guidance-provides-regulatory-clarity-to-crypto-experts-say/</guid><pubDate>Wed, 01 Apr 2026 00:02:59 EST</pubDate><description><![CDATA[Interpretive guidance defining cryptocurrency assets released last month by the U.S. Securities and Exchange Commission and Commodity Futures Trading Commission goes a long way to providing the regulatory clarity the Trump administration has been promising the industry, legal experts said.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952654004/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952654004/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f15%2f93%2f6a342f264b70a204728026c514f1%2fcftc-sec-jpg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952654004/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952654004/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952654004/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/supreme-court-unanimously-rejects-effort-to-hold-isps-liable-for-customers-copyright-infringement/">Supreme Court Unanimously Rejects Effort to Hold ISPs Liable for Customers' Copyright Infringement</a></li></ul>&#160;</div>]]>
</description><category>cryptocurrency</category><category>legal technology</category><category>regulation</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Dan Novak</thename><imageURL>https://feeds.feedblitz.com/-/924599585/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Cryptocurrency/Legal Technology/Regulation/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/924599585/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/924599585/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767"/></media:content><sailthru:vars><sailthru:simpleDate>2026-04-01</sailthru:simpleDate><sailthru:byline>Dan Novak</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Cryptocurrency|Legal Technology|Regulation|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Cryptocurrency</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:topic>Regulation</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/924599585/0/ljn/cybersecurity-law-and-strategy.jpg,767,505</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/924599585/0/ljn/cybersecurity-law-and-strategy.jpg" height="505" width="767">https://feeds.feedblitz.com/-/924599585/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="505">505</sailthru:image1_height><sailthru:image1_width width="767">767</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/15/93/6a342f264b70a204728026c514f1/cftc-sec-jpg767x505.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>Interpretive guidance defining cryptocurrency assets released last month by the U.S. Securities and Exchange Commission and Commodity Futures Trading Commission goes a long way to providing the regulatory clarity the Trump administration has been promising the industry, legal experts said.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952654004/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/952654004/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/952654004/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2f15%2f93%2f6a342f264b70a204728026c514f1%2fcftc-sec-jpg767x505.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/952654004/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/952654004/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/952654004/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/supreme-court-unanimously-rejects-effort-to-hold-isps-liable-for-customers-copyright-infringement/">Supreme Court Unanimously Rejects Effort to Hold ISPs Liable for Customers' Copyright Infringement</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/01/state-age-verification-mandates-could-redefine-coppa-risk-for-general-audience-apps/</feedburner:origLink><title>State Age Verification Mandates Could Redefine COPPA Risk for General Audience Apps</title><link>https://feeds.feedblitz.com/~/948888935/0/ljn/cybersecurity-law-and-strategy~State-Age-Verification-Mandates-Could-Redefine-COPPA-Risk-for-General-Audience-Apps/</link><guid>http://www.lawjournalnewsletters.com/2026/03/01/state-age-verification-mandates-could-redefine-coppa-risk-for-general-audience-apps/</guid><pubDate>Sun, 01 Mar 2026 04:04:40 EST</pubDate><description><![CDATA[State app store age verification regimes do more than reallocate responsibility between platforms and developers. They create a new data supply chain for age knowledge, one that can move COPPA questions from &ldquo;do we ask age?  to &ldquo;what do we do when the platform tells us?  The teams that handle this best will treat platform age signals as sensitive compliance inputs: minimize them, tightly control where they flow, and design product behavior so that minors do not trigger unnecessary collection or disclosure.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948888935/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948888935/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f415%2f2023%2f04%2fTeens-Social-Network.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948888935/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948888935/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948888935/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/sec-and-cftc-guidance-provides-regulatory-clarity-to-crypto-experts-say/">SEC and CFTC Guidance Provides Regulatory Clarity to Crypto, Experts Say</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li></ul>&#160;</div>]]>
</description><category>privacy</category><category>cybersecurity</category><category>legal technology</category><category>regulation</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Robert Botkin and Sarah Hutchins and Madelyn Candela</thename><imageURL>https://feeds.feedblitz.com/-/948888932/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Privacy/Cybersecurity/Legal Technology/Regulation/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/948888932/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/948888932/0/ljn/cybersecurity-law-and-strategy.jpg" height="640" width="640"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Robert Botkin and Sarah Hutchins and Madelyn Candela</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Privacy|Cybersecurity|Legal Technology|Regulation|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Privacy</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:topic>Regulation</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/948888932/0/ljn/cybersecurity-law-and-strategy.jpg,640,640</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/948888932/0/ljn/cybersecurity-law-and-strategy.jpg" height="640" width="640">https://feeds.feedblitz.com/-/948888932/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="640">640</sailthru:image1_height><sailthru:image1_width width="640">640</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/415/2023/04/Teens-Social-Network.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>State app store age verification regimes do more than reallocate responsibility between platforms and developers. They create a new data supply chain for age knowledge, one that can move COPPA questions from &ldquo;do we ask age?  to &ldquo;what do we do when the platform tells us?  The teams that handle this best will treat platform age signals as sensitive compliance inputs: minimize them, tightly control where they flow, and design product behavior so that minors do not trigger unnecessary collection or disclosure.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948888935/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948888935/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948888935/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f415%2f2023%2f04%2fTeens-Social-Network.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948888935/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948888935/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948888935/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/03/31/beyond-breaches-the-rise-of-non-breach-privacy-claims-in-cyber-insurance/">Beyond Breaches: The Rise of Non-Breach Privacy Claims in Cyber Insurance</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/sec-and-cftc-guidance-provides-regulatory-clarity-to-crypto-experts-say/">SEC and CFTC Guidance Provides Regulatory Clarity to Crypto, Experts Say</a></li><li><a rel="NOFOLLOW" href="http://www.lawjournalnewsletters.com/2026/04/01/key-takeaways-from-legalweek-2026-on-prompting-context-and-agents/">Key Takeaways from Legalweek 2026 On Prompting, Context and Agents</a></li></ul>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/01/using-ai-without-waiving-privilege-lessons-from-united-states-v-heppner/</feedburner:origLink><title>Using AI Without Waiving Privilege: Lessons from United States v. Heppner</title><link>https://feeds.feedblitz.com/~/948857345/0/ljn/cybersecurity-law-and-strategy~Using-AI-Without-Waiving-Privilege-Lessons-from-United-States-v-Heppner/</link><guid>http://www.lawjournalnewsletters.com/2026/03/01/using-ai-without-waiving-privilege-lessons-from-united-states-v-heppner/</guid><pubDate>Sun, 01 Mar 2026 01:47:57 EST</pubDate><description><![CDATA[A recent decision from the U.S. District Court for the Southern District of New York (SDNY), <i>United States v. Heppner</i>, has generated outsized commentary suggesting that the use of generative AI tools may jeopardize attorney-client privilege. A closer reading shows something far less dramatic.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948857345/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948857345/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f397%2f2024%2f09%2fAI-ethics-law-767x633.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948857345/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948857345/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948857345/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity</category><category>legal technology</category><category>cybersecurity law &amp; strategy</category><category>cover story cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Shawn. C. Helms and Caitlin (Cate) Howe and Jason Krieser and Joseph Evans</thename><imageURL>https://feeds.feedblitz.com/-/948857342/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity/Legal Technology/Cybersecurity Law &amp; Strategy/Cover Story Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/948857342/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/948857342/0/ljn/cybersecurity-law-and-strategy.jpg" height="633" width="768"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Shawn. C. Helms and Caitlin (Cate) Howe and Jason Krieser and Joseph Evans</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Cover Story|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity|Legal Technology|Cybersecurity Law &amp; Strategy|Cover Story Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/948857342/0/ljn/cybersecurity-law-and-strategy.jpg,768,633</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/948857342/0/ljn/cybersecurity-law-and-strategy.jpg" height="633" width="768">https://feeds.feedblitz.com/-/948857342/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="633">633</sailthru:image1_height><sailthru:image1_width width="768">768</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/397/2024/09/AI-ethics-law-767x633.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[A recent decision from the U.S. District Court for the Southern District of New York (SDNY), <i>United States v. Heppner</i>, has generated outsized commentary suggesting that the use of generative AI tools may jeopardize attorney-client privilege. A closer reading shows something far less dramatic.<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948857345/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948857345/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948857345/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f397%2f2024%2f09%2fAI-ethics-law-767x633.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948857345/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948857345/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948857345/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/01/2025-state-privacy-roundup-key-trends-and-california-developments-to-watch-in-2026/</feedburner:origLink><title>2025 State Privacy Roundup: Key Trends and California Developments to Watch In 2026</title><link>https://feeds.feedblitz.com/~/948855797/0/ljn/cybersecurity-law-and-strategy~State-Privacy-Roundup-Key-Trends-and-California-Developments-to-Watch-In/</link><guid>http://www.lawjournalnewsletters.com/2026/03/01/2025-state-privacy-roundup-key-trends-and-california-developments-to-watch-in-2026/</guid><pubDate>Sun, 01 Mar 2026 01:41:13 EST</pubDate><description><![CDATA[The 2025 legislative cycle marked a pivotal year in U.S. privacy law, defined not only by continued nationwide expansion into&nbsp;AI) governance, children's and teen privacy and&nbsp;online safety, as well as emerging data categories. In this article, we detail what enterprises need to be prepared for in 2026 and explain why we believe next year will be a watershed period for consumer privacy in the U.S.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948855797/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948855797/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f292%2f2021%2f09%2fprivacy_law2_767.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948855797/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948855797/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948855797/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description><category>privacy</category><category>cybersecurity</category><category>legal technology</category><category>legislation</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Alan Friel and Lydia de la Torre </thename><imageURL>https://feeds.feedblitz.com/-/920988611/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Privacy/Cybersecurity/Legal Technology/Legislation/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/920988611/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/920988611/0/ljn/cybersecurity-law-and-strategy.jpg" height="633" width="767"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Alan Friel and Lydia de la Torre </sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Privacy|Cybersecurity|Legal Technology|Legislation|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Privacy</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:topic>Legislation</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/920988611/0/ljn/cybersecurity-law-and-strategy.jpg,767,633</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/920988611/0/ljn/cybersecurity-law-and-strategy.jpg" height="633" width="767">https://feeds.feedblitz.com/-/920988611/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="633">633</sailthru:image1_height><sailthru:image1_width width="767">767</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/292/2021/09/privacy_law2_767.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>The 2025 legislative cycle marked a pivotal year in U.S. privacy law, defined not only by continued nationwide expansion into&nbsp;AI) governance, children's and teen privacy and&nbsp;online safety, as well as emerging data categories. In this article, we detail what enterprises need to be prepared for in 2026 and explain why we believe next year will be a watershed period for consumer privacy in the U.S.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948855797/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948855797/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948855797/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f292%2f2021%2f09%2fprivacy_law2_767.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948855797/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948855797/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948855797/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/01/the-google-illusion-why-search-results-are-not-due-diligence/</feedburner:origLink><title>The Google Illusion: Why Search Results Are Not Due Diligence</title><link>https://feeds.feedblitz.com/~/948854150/0/ljn/cybersecurity-law-and-strategy~The-Google-Illusion-Why-Search-Results-Are-Not-Due-Diligence/</link><guid>http://www.lawjournalnewsletters.com/2026/03/01/the-google-illusion-why-search-results-are-not-due-diligence/</guid><pubDate>Sun, 01 Mar 2026 01:30:41 EST</pubDate><description><![CDATA[Every decision to onboard a client, partner, lateral hire, contractor, consultant or expert witness carries risk. Yet despite the increasing complexity of that risk, many firms continue to rely on onboarding practices that have not kept pace with the digital world in which their clients and people operate. The result is a widening gap between how risk actually manifests today and how it is assessed at the point of onboarding.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948854150/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948854150/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2fb2%2fcf%2fd6bd066948578219a2d710cd80f7%2fgoogle-search-767x633.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948854150/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948854150/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948854150/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description><category>cybersecurity</category><category>legal technology</category><category>social media</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Matt Winlaw</thename><imageURL>https://feeds.feedblitz.com/-/916853435/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Cybersecurity/Legal Technology/Social Media/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/916853435/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/916853435/0/ljn/cybersecurity-law-and-strategy.jpg" height="633" width="767"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Matt Winlaw</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Cybersecurity|Legal Technology|Social Media|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:topic>Social Media</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/916853435/0/ljn/cybersecurity-law-and-strategy.jpg,767,633</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/916853435/0/ljn/cybersecurity-law-and-strategy.jpg" height="633" width="767">https://feeds.feedblitz.com/-/916853435/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="633">633</sailthru:image1_height><sailthru:image1_width width="767">767</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/b2/cf/d6bd066948578219a2d710cd80f7/google-search-767x633.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>Every decision to onboard a client, partner, lateral hire, contractor, consultant or expert witness carries risk. Yet despite the increasing complexity of that risk, many firms continue to rely on onboarding practices that have not kept pace with the digital world in which their clients and people operate. The result is a widening gap between how risk actually manifests today and how it is assessed at the point of onboarding.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948854150/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948854150/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948854150/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fk2-prod-alm.s3.us-east-1.amazonaws.com%2fbrightspot%2fb2%2fcf%2fd6bd066948578219a2d710cd80f7%2fgoogle-search-767x633.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948854150/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948854150/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948854150/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/01/analyzing-ai-transactions/</feedburner:origLink><title>Analyzing AI Transactions</title><link>https://feeds.feedblitz.com/~/948852524/0/ljn/cybersecurity-law-and-strategy~Analyzing-AI-Transactions/</link><guid>http://www.lawjournalnewsletters.com/2026/03/01/analyzing-ai-transactions/</guid><pubDate>Sun, 01 Mar 2026 01:26:51 EST</pubDate><description><![CDATA[Understanding the &ldquo;not written by people  feature of AI software is the best lens for viewing AI transactions. The fact that an AI is not a legal entity, prompts the proper legal analysis of AI transactions.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948852524/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948852524/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f296%2f2023%2f03%2fSearch-engine-Article-202303270813.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948852524/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948852524/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948852524/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity</category><category>legal technology</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Jonathan Bick</thename><imageURL>https://feeds.feedblitz.com/-/948852521/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity/Legal Technology/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/948852521/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/948852521/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Jonathan Bick</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity|Legal Technology|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/948852521/0/ljn/cybersecurity-law-and-strategy.jpg,620,372</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/948852521/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620">https://feeds.feedblitz.com/-/948852521/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="372">372</sailthru:image1_height><sailthru:image1_width width="620">620</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/296/2023/03/Search-engine-Article-202303270813.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>Understanding the &ldquo;not written by people  feature of AI software is the best lens for viewing AI transactions. The fact that an AI is not a legal entity, prompts the proper legal analysis of AI transactions.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948852524/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948852524/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948852524/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f296%2f2023%2f03%2fSearch-engine-Article-202303270813.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948852524/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948852524/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948852524/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/01/now-hearing-the-case-of-generative-ai-v-traditional-machine-learning/</feedburner:origLink><title>Now Hearing the Case of Generative AI v. Traditional Machine Learning</title><link>https://feeds.feedblitz.com/~/948852530/0/ljn/cybersecurity-law-and-strategy~Now-Hearing-the-Case-of-Generative-AI-v-Traditional-Machine-Learning/</link><guid>http://www.lawjournalnewsletters.com/2026/03/01/now-hearing-the-case-of-generative-ai-v-traditional-machine-learning/</guid><pubDate>Sun, 01 Mar 2026 01:23:57 EST</pubDate><description><![CDATA[A great debate seems to be rearing its head is it better to conduct document review with traditional machine learning or with generative AI? This article examines traditional machine learning and generative AI in the context of review for production in litigation matters. While each party seeks to improve efficiency and defensibility, they differ meaningfully in workflow, transparency, human involvement, and overall impact on legal practice.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948852530/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948852530/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f414%2f2019%2f11%2fAI_machine-learning_iStock.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948852530/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948852530/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948852530/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity</category><category>legal technology</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Cristin Traylor</thename><imageURL>https://feeds.feedblitz.com/-/948852527/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity/Legal Technology/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/948852527/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/948852527/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Cristin Traylor</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity|Legal Technology|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/948852527/0/ljn/cybersecurity-law-and-strategy.jpg,620,372</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/948852527/0/ljn/cybersecurity-law-and-strategy.jpg" height="372" width="620">https://feeds.feedblitz.com/-/948852527/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="372">372</sailthru:image1_height><sailthru:image1_width width="620">620</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/414/2019/11/AI_machine-learning_iStock.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>A great debate seems to be rearing its head is it better to conduct document review with traditional machine learning or with generative AI? This article examines traditional machine learning and generative AI in the context of review for production in litigation matters. While each party seeks to improve efficiency and defensibility, they differ meaningfully in workflow, transparency, human involvement, and overall impact on legal practice.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948852530/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948852530/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948852530/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f414%2f2019%2f11%2fAI_machine-learning_iStock.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948852530/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948852530/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948852530/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/01/contracts-covering-risk-as-insurance-retreats-from-ai-exposure/</feedburner:origLink><title>Contracts Covering Risk As Insurance Retreats from AI Exposure</title><link>https://feeds.feedblitz.com/~/948850709/0/ljn/cybersecurity-law-and-strategy~Contracts-Covering-Risk-As-Insurance-Retreats-from-AI-Exposure/</link><guid>http://www.lawjournalnewsletters.com/2026/03/01/contracts-covering-risk-as-insurance-retreats-from-ai-exposure/</guid><pubDate>Sun, 01 Mar 2026 01:17:46 EST</pubDate><description><![CDATA[As insurance retreated from AI exposure, contracts began absorbing functions that insurance once performed. Indemnities compressed. In effect, contracts began underwriting elements of AI risk. This shift has significant consequences for lawyers drafting, negotiating and advising on AI-related agreements.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948850709/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948850709/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f414%2f2024%2f09%2fInsurance-policy.jpg-image767x633cropped-2.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948850709/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948850709/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948850709/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity</category><category>insurance law</category><category>legal technology</category><category>risk management</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Olga V. Mack</thename><imageURL>https://feeds.feedblitz.com/-/948850706/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity/Insurance Law/Legal Technology/Risk Management/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/948850706/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/948850706/0/ljn/cybersecurity-law-and-strategy.jpg" height="633" width="767"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Olga V. Mack</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity|Insurance Law|Legal Technology|Risk Management|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Insurance Law</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:topic>Risk Management</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/948850706/0/ljn/cybersecurity-law-and-strategy.jpg,767,633</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/948850706/0/ljn/cybersecurity-law-and-strategy.jpg" height="633" width="767">https://feeds.feedblitz.com/-/948850706/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="633">633</sailthru:image1_height><sailthru:image1_width width="767">767</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/414/2024/09/Insurance-policy.jpg-image767x633cropped-2.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>As insurance retreated from AI exposure, contracts began absorbing functions that insurance once performed. Indemnities compressed. In effect, contracts began underwriting elements of AI risk. This shift has significant consequences for lawyers drafting, negotiating and advising on AI-related agreements.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948850709/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948850709/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948850709/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f414%2f2024%2f09%2fInsurance-policy.jpg-image767x633cropped-2.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948850709/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948850709/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948850709/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/02/28/the-confidence-dashboard-why-ai-humility-beats-ai-accuracy/</feedburner:origLink><title>The Confidence Dashboard: Why AI Humility Beats AI Accuracy</title><link>https://feeds.feedblitz.com/~/948898193/0/ljn/cybersecurity-law-and-strategy~The-Confidence-Dashboard-Why-AI-Humility-Beats-AI-Accuracy/</link><guid>http://www.lawjournalnewsletters.com/2026/02/28/the-confidence-dashboard-why-ai-humility-beats-ai-accuracy/</guid><pubDate>Sun, 01 Mar 2026 01:14:59 EST</pubDate><description><![CDATA[You would not tolerate an associate with uniform confidence for very long. It makes them less useful, not more, because you cannot triage your review. Every assertion demands the same level of scrutiny. Yet this is precisely how every major large language model operates today. And the artificial intelligence industry's proposed solution &mdash; spending billions to marginally reduce hallucinations &mdash; fundamentally misunderstands what lawyers actually need.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948898193/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948898193/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f412%2f2019%2f08%2f04-confidence-index.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948898193/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948898193/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948898193/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity</category><category>legal technology</category><category>cybersecurity law &amp; strategy</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Michael William Ott</thename><imageURL>https://feeds.feedblitz.com/-/948898190/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity/Legal Technology/Cybersecurity Law &amp; Strategy/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/948898190/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/948898190/0/ljn/cybersecurity-law-and-strategy.jpg" height="411" width="617"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Michael William Ott</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity|Legal Technology|Cybersecurity Law &amp; Strategy|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Cybersecurity</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/948898190/0/ljn/cybersecurity-law-and-strategy.jpg,617,411</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/948898190/0/ljn/cybersecurity-law-and-strategy.jpg" height="411" width="617">https://feeds.feedblitz.com/-/948898190/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="411">411</sailthru:image1_height><sailthru:image1_width width="617">617</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/412/2019/08/04-confidence-index.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>You would not tolerate an associate with uniform confidence for very long. It makes them less useful, not more, because you cannot triage your review. Every assertion demands the same level of scrutiny. Yet this is precisely how every major large language model operates today. And the artificial intelligence industry's proposed solution &mdash; spending billions to marginally reduce hallucinations &mdash; fundamentally misunderstands what lawyers actually need.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948898193/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948898193/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948898193/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f412%2f2019%2f08%2f04-confidence-index.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948898193/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948898193/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948898193/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.lawjournalnewsletters.com/2026/03/01/potential-enterprise-risks-of-artificial-intelligence/</feedburner:origLink><title>Potential Enterprise Risks of Artificial Intelligence</title><link>https://feeds.feedblitz.com/~/948850658/0/ljn/cybersecurity-law-and-strategy~Potential-Enterprise-Risks-of-Artificial-Intelligence/</link><guid>http://www.lawjournalnewsletters.com/2026/03/01/potential-enterprise-risks-of-artificial-intelligence/</guid><pubDate>Sun, 01 Mar 2026 01:13:21 EST</pubDate><description><![CDATA[A series of recent, startling public comments from technology industry leaders should alert governing boards to the potential enterprise risks of artificial intelligence to their own organization. These public comments address two increasingly worrisome aspects of AI: first, the potential for AI to quickly evolve into an autonomous and unpredictable &ldquo;rogue  technology; and second, the risk of significant economic and social disruption from mass AI-prompted worker displacement.<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948850658/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948850658/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f413%2f2018%2f11%2fAI-Risk-e1541081603727.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948850658/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948850658/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948850658/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description><category>artificial intelligence</category><category>cybersecurity law &amp; strategy</category><category>legal technology</category><category>features</category><author><thesource>Law Journal Newsletters</thesource><thename>Michael W. Peregrine</thename><imageURL>https://feeds.feedblitz.com/-/948850655/0/ljn/cybersecurity-law-and-strategy.jpg</imageURL><thepracticearea>Artificial Intelligence/Cybersecurity Law &amp; Strategy/Legal Technology/Features</thepracticearea></author><media:content url="https://feeds.feedblitz.com/-/948850655/0/ljn/cybersecurity-law-and-strategy.jpg"><media:thumbnail url="https://feeds.feedblitz.com/-/948850655/0/ljn/cybersecurity-law-and-strategy.jpg" height="438" width="620"/></media:content><sailthru:vars><sailthru:simpleDate>2026-03-01</sailthru:simpleDate><sailthru:byline>Michael W. Peregrine</sailthru:byline><sailthru:channel_list>Topics|LJN Newsletters|Kicker</sailthru:channel_list><sailthru:section_list>Artificial Intelligence|Cybersecurity Law &amp; Strategy|Legal Technology|Features</sailthru:section_list><sailthru:sections type="kicker">Features</sailthru:sections><sailthru:kicker>Features</sailthru:kicker><sailthru:topic>Artificial Intelligence</sailthru:topic><sailthru:topic>Legal Technology</sailthru:topic><sailthru:image_array>https://feeds.feedblitz.com/-/948850655/0/ljn/cybersecurity-law-and-strategy.jpg,620,438</sailthru:image_array><sailthru:image1 url="https://feeds.feedblitz.com/-/948850655/0/ljn/cybersecurity-law-and-strategy.jpg" height="438" width="620">https://feeds.feedblitz.com/-/948850655/0/ljn/cybersecurity-law-and-strategy.jpg</sailthru:image1><sailthru:image1_height height="438">438</sailthru:image1_height><sailthru:image1_width width="620">620</sailthru:image1_width></sailthru:vars>
<feedburner:origEnclosureLink>https://images.lawjournalnewsletters.com/contrib/content/uploads/sites/413/2018/11/AI-Risk-e1541081603727.jpg</feedburner:origEnclosureLink>
<content:encoded><![CDATA[<p>A series of recent, startling public comments from technology industry leaders should alert governing boards to the potential enterprise risks of artificial intelligence to their own organization. These public comments address two increasingly worrisome aspects of AI: first, the potential for AI to quickly evolve into an autonomous and unpredictable &ldquo;rogue  technology; and second, the risk of significant economic and social disruption from mass AI-prompted worker displacement.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/948850658/0/ljn/cybersecurity-law-and-strategy">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/948850658/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="https://feeds.feedblitz.com/_/29/948850658/ljn/cybersecurity-law-and-strategy,https%3a%2f%2fimages.lawjournalnewsletters.com%2fcontrib%2fcontent%2fuploads%2fsites%2f413%2f2018%2f11%2fAI-Risk-e1541081603727.jpg"><img height="20" src="https://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/948850658/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/948850658/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/948850658/ljn/cybersecurity-law-and-strategy"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
</channel></rss>

