blog.specialcounsel.com – Cover letters are often an afterthought in a job search. They are written quickly, mainly to make an introduction. Legal professionals are trained to write and in some instances, will write lengthy c… Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1123206642399678471
Doing it big with data: 7 Chicago companies detail how big data leads to real-world impacts
builtinchicago.org – Big data as a general concept is incredibly varied in its use cases and the conclusions it leads to. While it can be helpful in building out a single product, it can also be the basis of an
Shifting the e-Discovery Paradigm from Documents to People | Blog | Relativity
relativity.com – TV defense attorney Ben Matlock is one of the most well-known fictional characters in American pop culture: a folksy, bad-tempered southern attorney, he has a penchant for calling out perpetrators in… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1121851644365426688
Intelligence Agencies Seek Fast Cyber Threat Dissemination
bankinfosecurity.com – Cybercrime , Cybersecurity , Cyberwarfare / Nation-state attacks When a cyberattack begins, Canada’s intelligence establishment can get essential threat information to a critical infrastructure provi… Tweeted by @MetadataMatters https://twitter.com/MetadataMatters/status/1121776784234700800
Built In Chicago’s Top Companies Hiring
eventbrite.com – Eventbrite, and certain approved third parties, use functional, analytical and tracking cookies (or similar technologies) to understand your event preferences and provide you with a customized experi… Tweeted by @MetadataMatters https://twitter.com/MetadataMatters/status/1121776651510145024
Relativity Community
community.relativity.com – CSS Error Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1121806614615470081
3 Ways Managed Document Review Can Benefit Your Next Case
blog.specialcounsel.com – You’ve all been there. Looming deadlines require you to have the data reviewed stat, but the expense is enough to make you hesitate. Whether it is for a government request, an internal investigation … Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1120771884470210565
Data breach at Chipotle fast food restaurant; app accounts were hacked
securitynewspaper.com – According to cyber forensics course specialists from the International Institute of Cyber Security (IICS), some users of the fast food chain app Chipotle Mexican Grill report that their accounts have… Tweeted by @Webimprints https://twitter.com/Webimprints/status/1120402514006900741
Data of 11,639 Riverplace patients at risk from malware
healthdatamanagement.com – Riverplace Consulting Center, Anoka, Minn., is notifying 11,639 patients and the HHS Office for Civil Rights after finding malware in its information systems. “Although at this time there is no evide… Tweeted by @HDMmagazine https://twitter.com/HDMmagazine/status/1120472211029098497
Utah County Struck by Ransomware
securityweek.com – Garfield County, Utah, was recently affected by ransomware. Local government is an increasingly attractive target for criminals because of its high dependence on information technology, and generally… Tweeted by @balbixinc https://twitter.com/balbixinc/status/1120432268143661056
How to monitor your data breach exposure
medium.com – If you’re not yet monitoring your data breach exposure, I really recommend you start doing it now. If you’re already doing it, I hope this post is still useful as I’ll share some tools and best pract… Tweeted
Spy on your smart home with this open source research tool – TechCrunch
techcrunch.com – Researchers at Princeton University have built a web app that lets you (and them) spy on your smart home devices to see what they’re up to. The open source tool, called IoT Inspector, is available fo… Tweeted by
ICYMI: A quick look at recent Privacy and Cybersecurity headlines | JD Supra
jdsupra.com – JD Supra is a legal publishing service that connects experts and their content with broader audiences of professionals, journalists and associations. This Privacy Policy describes how JD Supra, LLC (… Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1119281007948115970
Available Positions | Relativity
relativity.com – Peruse our available positions below, or get more intel straight from those who’ve been here by checking out Glassdoor. If you need help preparing for an interview, check out our tips. Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1119239476679626752
3 Reasons Why You Shouldn’t Ghost Your Recruiter in the Legal Industry
blog.specialcounsel.com – More and more we are seeing a trend of candidates that ghost their recruiters during a job hunt. Ghosting essentially means cutting communication with no explanation. Someone might wonder why you mig… Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1118959937630220289
Five Reasons Email Deduplication isn’t Comprehensive
In today’s typical enterprise environment, collection points expand far beyond an exchange server and a share drive. From the cloud and mobile data to social media and chat, collection points are incredibly diverse, leading to data related issues that result in
BDO Expands Global E-Discovery Capabilities
bdo.com – BDO Expands Global E-Discovery Capabilities BDO First to Offer Cloud-Based E-Discovery Solution RelativityOne in Brazil April 8, 2019—CHICAGO—BDO USA LLP, one of the nation’s leading professional ser… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1117472781074092032
Microsoft discloses security breach that impacted some Outlook accounts | ZDNet
zdnet.com – On Friday, Microsoft sent out notification emails to some users informing Outlook account owners of a breach the company suffered and which might have also impacted Outlook users directly. According … Tweeted by @j_opdenakker https://twitter.com/j_opdenakker/status/1117503833435930624
Litigation Funding In Patent And Intellectual Property Cases
abovethelaw.com – Litigation finance — what’s the deal with that? There are lots of ways to look at this increasingly important field. For example, you might think of litigation funding as a big help to clients (if yo… Tweeted by
Hackers in Microsoft’s webmail breach could read some users’ messages
engadget.com – The same source also claimed that the hackers had access for “at least six months,” although Microsoft disputed this and maintained that the culprits’ access lasted between January 1st and March 28th… Tweeted by @workonline44 https://twitter.com/workonline44/status/1117779995156307968