youracclaim.com – GDAT holders have demonstrated advanced knowledge of the adversarial techniques used to penetrate networks and the most effective security controls to stop them. These professionals understand both r… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1208137788450885632
Recent Vulnerabilities in Envoy Explained, Including Impact to Istio
blog.paloaltonetworks.com – On Dec. 10, three vulnerabilities in the Envoy proxy were made public, one of which was classified as “high severity” and two as “medium severity,” affecting all versions up to and including Envoy 1.… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1208059342311702528
The EDRM’s Mary Mack & Kaylee Walstad Unplugged – Legal Talk Network
legaltalknetwork.com – Digital Detectives Sharon Nelson and John Simek welcome Mary Mack and Kaylee Walstad to discuss the current happenings at the Electronic Discovery Reference Model (EDRM). Mary and Kaylee recently acq… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1208377081022816261
Could a Legal Operations Role Benefit Your Organization? Here’s How to Decide | Legaltech News
law.com – Expert Opinion Could a Legal Operations Role Benefit Your Organization? Here’s How to Decide Between recruiting new talent, creating budgets, cooperating with outside counsel, managing billing issues… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1207680745692704773
Cyber Risk Faced by SMEs – Advisen Ltd.
advisenltd.com – Cybercrime costs businesses worldwide trillions of dollars and although network security incidents of large companies garner headlines, these attacks are more prevalent against small and medium-sized… Tweeted by @advcyberrisk https://twitter.com/advcyberrisk/status/1207722260091539457
SANS Announces Northern Virginia 2020 Cyber Security Training Event | SANS Institute: Press
sans.org – SANS Institute, the global leader in cyber security training and certifications, today announced SANS Northern VA – Reston Spring 2020, taking place March 2-7. Real-world practitioners will share tip… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1207775180669554693
Network Penetration Testing and Ethical Hacking | Community
sans.org – As a cybersecurity professional, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are yo… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1208024417063899139
Great Leaders Are Thoughtful and Deliberate, Not Impulsive and Reactive
hbr.org – You set aside the first hour of your day to work on a strategy document that you’ve been putting off for a week. You haven’t been disciplined about getting to it, but you’ve had one crisis after anot…
Five Great Reads on Data Discovery and Legal Discovery for December 2019
complexdiscovery.com – Five Great Reads on Data Discovery and Legal Discovery is a subscription newsletter regularly highlighting at least five articles to inform and update legal and information technology professionals o… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1207400797287460864
How the Grinch Steals Health Care Data: OCR Warnings and Tips in Time for the Holidays | HIPAA & Health Information Technology
hipaahealthlaw.foxrothschild.com – More and more often, health care data is stolen or made inaccessible by targeted ransomware attacks. The Office for Civil Rights (OCR) published a newsletter this week that provides warnings for HIPA… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1207332201844674564
The Ripple Effect of Data Breaches: How Damage Spreads
darkreading.com – A cyberattack limited to one organization can be enough to cause significant financial loss, data compromise, and long-term damage. When an attack extends to several victims, as is increasingly the c… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1207326916610527232
Spanish Companies, Including Radio Network, Hit by Cyber Attack
insurancejournal.com – A cyber attack has hit Spanish companies including Cadena SER radio, Spain’s National Security Department said on Monday. The virus affected Cadena SER’s local broadcasts, although national output wa… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1207651290412703751
Rise of the ‘Platform’ Slated to Drive 2020 Legal Tech Deals
biglawbusiness.com – It’s difficult to predict precisely whether legal tech consolidation will continue as quickly next year as it did in 2018 and 2019, but industry observers agree that “platformization” will be a key d… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1207635150521151488
Marketing Yourself as a Candidate
blog.specialcounsel.com – With the lowest unemployment rate in years and more competition than ever for available positions, taking a strategic approach to effectively marketing yourself as a candidate is essential. When gett… Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1206656489378725888
BLOG | 8 Signs You May Be a Lawyer
blog.specialcounsel.com – As an attorney, you work hard, and it would be nice to shed your lawyer persona when you’re not at work. But for many attorneys, that’s a tall order. The act of “lawyering” can carry over into everyd…
EXHIBIT A—The Meet and Confer Letter | LexBlog
lexblog.com – The purpose of the “meet and confer” requirements set forth in C.C.P. §§ 2025.450(b)(2), 2025.480, 2030.300(b), 2031.310(b), 2032.250 and 2033.290 was for the lawyers to revisit their position, and i… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1206290840596951041
Why Australia is a Hot Spot for Legal Innovation | Blog | Relativity
relativity.com – If you attended the Innovation Awards ceremony at the close of Relativity Fest this year or watched online, you might’ve thought to yourself … Wow, there are a lot of Aussies in this group. Australia… Tweeted by @RelativityHQ
Chrome Will Automatically Scan Your Passwords Against Data Breaches
wired.com – Google’s password checking feature has slowly been spreading across the Google ecosystem this past year. It started as the “Password Checkup” extension for desktop versions of Chrome, which would aud… Tweeted by @LantonLaw1 https://twitter.com/LantonLaw1/status/1206256506905210881
5 Reasons Why Programmers Should Think like Hackers
thehackernews.com – Programming has five main steps: the identification and definition of the problem, the planning of the solution for the problem, coding of the program, testing, and documentation. It’s a meticulous p… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1206564965500383232
How to Boost Gender Equality in the Legal Profession
blog.specialcounsel.com – Roughly half of current law school students are female, a far cry from Justice Ruth Bader Ginsberg’s experience at Harvard Law in the 1950s, where she was one of a handful of women in a class of more…