Businesses of all types and sizes throughout the United States, Mexico and beyond bring their disputes to Gardere's litigation team and receive practical, responsive, boutique-style attention in return. Our clients have access to the firepower and value of a well-known and highly-regarded Firm's capabilities and interdisciplinary strengths.
Gardere has a national and international energy practice formed around our Energy Industry Team, which is a multidisciplinary group of approximately 60 attorneys with diverse backgrounds, experience and skills specific to the energy industry. Our team includes attorneys who have served as in-house counsel for major energy companies, providing a depth of insight into our clients' needs, issues and concerns. We understand and regularly practice in virtually every sector of the energy, and we represent a wide variety of industry participants from multinational corporations to individuals.
From our offices in the United States and Mexico, our International Practice helps clients operate in today’s global economy. We have more than 30 professionals operating as a boutique within an Am Law 200 law firm and are able to provide focused service with the resources of a large firm. We understand that clients who are engaged in the global marketplace need lawyers who can operate seamlessly across multiple jurisdictions. Our international experts are multi-lingual, are culturally fluent and intimately familiar with various legal systems across the world, especially those in Latin America. Whether you need help with commercial transactions, regulatory matters, customs and import regulations, immigration matters, M&A and joint ventures, international disputes, or international tax planning, Gardere’s international team is here to assist you.
We represent domestic and foreign private funds in all aspects of fund formation, fund operations, platform and add-on acquisitions, and portfolio company operations. Our team has a reputation for being the go-to-lawyers for private equity funds, hedge funds, venture capital funds and family offices. We are known for our vast deal experience, the efficient way we staff and manage our work, and the way we maintain our relationships. We get deals done with sophisticated, strategic, and practical advice tailored to the needs of our clients.
*Not admitted to practice law.
A report from the Cloud Security Alliance (CSA) explained how the cloud is not as safe as many people think it is based on "nine major categories of threats that face cloud technologies" which organizations “must weigh these threats as part of a rigorous risk assessment, to determine which security controls are necessary." CDW issued a White Paper entitled "Playbook: Overcoming Cloud Security Concerns" which explained how to deal with the 9 CSA threats and explained the difference between data loss and data breach:
Data loss is sometimes confused with data breach. Unlike a data breach, which always involves an unauthorized party gaining access to sensitive data — an exploitation of confidentiality — data loss simply means that an organization's data has been deleted or overwritten, a failure of availability.
Here are the 9 CSA Threats with CDW’s comments included:
1. Data Breaches. Major data breaches have been reported at every type of organization: businesses, educational institutions, government agencies and others. Each data breach involves one or more unauthorized parties gaining access to portions of the organization's sensitive data.
2. Data Loss. Data loss generally occurs when data that has not been properly duplicated and secured to protect its availability is lost, deleted or otherwise made unavailable. Unfortunately, data loss has become more prevalent in cloud environments because many IT managers operate under the false assumption that the cloud inherently provides superior protection for availability.
3. Account or Service Traffic Hijacking. This threat involves the practice of gaining unauthorized access to a user account or service, such as stealing a user's password and logging into a system as that user, or exploiting vulnerability in a service to gain access to that service. Hijacking is most often performed to gain access to sensitive data to which a user or service has access, or to perform actions under the user's or service's privileges.
4. Insecure Interfaces. Software interfaces, such as application programming interfaces (APIs), provide access to cloud-based services by allowing commands to be issued against the service. Generally, some parts of an API allow for service usage, while other parts allow for service management. An insecure API can lead to compromises of both service usage and management, causing data breaches, data loss and other serious problems.
5. Denial of service. Denial of Service (DoS) attacks have been a threat against applications and services for many years. These attacks work by consuming resources, thus preventing legitimate users from accessing those resources.
6. Malicious Insiders. Malicious insiders are authorized personnel — users and administrators — who intentionally violate organizational policy for personal reasons, such as financial gain or revenge. Because they already have access to sensitive data, malicious insiders may readily cause data breaches, data losses and other negative effects. For example, an insider may copy a sensitive database onto a flash drive, then use the information stored on it to commit identity theft.
7. Abuse of Cloud Services. Abuse of cloud services involves parties taking advantage of cloud services to perform malicious acts, such as cracking passwords or launching attacks against other systems. Abuse of cloud services is a threat primarily affecting cloud service providers, not cloud customers.
8. Insufficient Due Diligence. Organizations that are considering the adoption of cloud technologies must fully understand the risks inherent in this step. An enterprise that does not effectively secure its cloud deployment to address the numerous cloud threats faces a significantly increased risk of compromise.
9. Shared Technology Vulnerabilities. Vulnerabilities within the cloud infrastructure itself, such as hypervisor weaknesses or an application or service shared by cloud users from different organizations, also represent a threat. The risk of these vulnerabilities is that an attacker can exploit a weakness in one piece of software to gain unauthorized access to data and services for multiple cloud customers.
Of course with proper planning most of these threats can be eliminated.
The publications contained in this site do not constitute legal advice. Legal advice can only be given with knowledge of the client's specific facts. By putting these publications on our website we do not intend to create a lawyer-client relationship with the user. Materials may not reflect the most current legal developments, verdicts or settlements. This information should in no way be taken as an indication of future results.
You may use the wildcard symbol (*) as a root expander. A search for "anti*" will find not only "anti", but also "anti-trust", "antique", etc.
Entering two terms together in a search field will behave as though an "OR" is being used. For example, entering "Antique Motorcars" as a Client Name search will find results with either word in the Client Name.
AND and OR may be used in a search. Note: they must be capitalized, e.g., "Project AND Finance."
The + and - sign operators may be used. The + sign indicates that the term immediately following is required, while the - sign indicates to omit results that contain that term. E.g., "+real -estate" says results must have "real" but not "estate".
To perform an exact phrase search, surround your search phrase with quotation marks. For example, "Project Finance".
Searches are not case sensitive.