tomtunguz.com – Today, the world’s most valuable brand is Apple. Forbes estimates Apple’s brand is worth $205B. Why is Apple’s brand worth so much? It’s the trust the brand inspires in consumers. Apple customers kno… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1220822507244212224
CloudNine Announces 2020 NineForum Discovery Education Series Speaker Lineup for Legalweek NY Featuring eDiscovery Thought Leaders – CloudNine
cloudnine.com – Global eDiscovery Technology Company’s Second Annual NineForum Sessions will Convey Cutting-Edge Strategies and Modern Best Practices for Electronic Discovery and Information Governance. HOUSTON – Ja… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1220851293666914310
The Future of Work: Sea Change Ahead in Productivity, Collaboration and More
cmswire.com – Workplace productivity took a dramatic leap forward when email and internet services first appeared on the enterprise scene over 20 years ago. Now, the pervasive use of artificial intelligence (AI), … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1221062749473722373
Will Blockchain Bloom Into a Full Stack Technology?
cmswire.com – The evolution of blockchain over the past year has been breathtaking. Although the technology is now more than ten-years-old, over the past couple of years its has moved out of a narrow use-case in c… Tweeted by @ComplexD
Record Retention is a Key Component of Your Privacy and Cyber Compliance Program | LexBlog
lexblog.com – This blogpost summarises our recent webinar: “An urgent message from Berlin: The importance of record retention in privacy and cybersecurity”. Why should this be a high priority project? Increased re… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1220692916726792193
Drunks, DNA and Data Transfer Risk in eDiscovery
complexdiscovery.com – “In law as in other realms, the understanding of randomness can reveal hidden layers of truth, but only to those who possess the tools to uncover them.” Leonard Mlodinow [1] Recently I had an opportu… Tweeted by @ComplexD
Does Litigation Risk Deter Insider Trading?
clsbluesky.law.columbia.edu – Does regulation deter insider trading? This has been a controversial question, with mixed empirical findings. One set of studies finds that insider trading regulations have been effective in reducing… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1220010492678279173
Does Your B2B Company Need a Podcast?
cmswire.com – Podcast listeners make for an interesting audience segment for B2B brands. According to recent reports on podcasting, 74% of podcast listeners want to learn new things, and they’re more likely to be … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1219670025985982465
Five Great Reads on Data Discovery and Legal Discovery for January 2020
complexdiscovery.com – Five Great Reads on Data Discovery and Legal Discovery is a subscription newsletter regularly highlighting at least five articles to inform and update legal and information technology professionals o… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1219638823665176576
It’s 2020. Why Are You Still Using PowerPoint?
inc.com – Everybody hates PowerPoint. Nobody, anywhere, anytime, has ever thought: “Hooray! He’s starting his PowerPoint presentation!” That, in itself, doesn’t necessarily mean that PowerPoint is useless. Aft… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1219947378557575169
Don’t Forget the Sneaky Hidden Data: Best Practices for Managing Data Stored on Copiers/Machines | JD Supra
jdsupra.com – JD Supra is a legal publishing service that connects experts and their content with broader audiences of professionals, journalists and associations. This Privacy Policy describes how JD Supra, LLC (… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1218974413485477892
Cyber Security Training in Anaheim | SANS Anaheim 2020
sans.org – Threats approach from every direction and SANS delivers reliable, professional information security training for every member of your organization – leaving no one unprepared. “Relevant, applicable i… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1219039404888674311
SANS Institute – Archive
sans.org – Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once … Tweeted by @SANSInstitute
Thinking of an investment in e-discovery, enterprise search or text analysis? Then maybe consult with the Autonomy boys. – Gregory Bufithis
gregorybufithis.com – He still has pride-of-place among my Legaltech swag 20 January 2020 (Paris, France) – When Hewlett-Packard (it changed its name to “HP” in 2015 and I’ll use that from this point on) bought Autonomy i… Tweeted by @ComplexD
Online Scams Are Catching Newly Vulnerable Icelanders Unprepared
insurancejournal.com – The treasurer of the Icelandic soccer club Afturelding got the email from his manager late in the afternoon, soon before banks were about to close. The words “Sent from my iPhone” were at the bottom,… Tweeted by @NetDiligence
1.2 Billion Records Found Exposed Online in a Single Server
wired.com – “While the part of the database Vinny found presumably might be acquired from us or one of our customers, it has definitely not been leaked from our database,” Simanauskas told WIRED. “We sign the ag… Tweeted by @NetDiligence
Is Cloud Computing the Answer to Genomics’ Big Data Problem?
labiotech.eu – The success of the genomics industry has led to generation of huge amounts of sequence data. If put to good use, this information has the potential to revolutionize medicine, but the expense of the h… Tweeted by @thomashilbig2
How Hackers Use Social Media To Profile Targets | SentinelOne
sentinelone.com – As cybercrime is all about monetary gain, attackers know that the more intelligence they gather about their targets the easier it is to achieve a compromise. On the other hand, most people voluntaril… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1218747427722801154
Threat Brief: Windows CryptoAPI Spoofing Vulnerability CVE-2020-0601
unit42.paloaltonetworks.com – In January 2020, during the first Patch Tuesday of the new year, Microsoft released patches for 17 new vulnerabilities including one for CVE-2020-0601 known as Curveball. The vulnerability exists in … Tweeted by @chidambara09 https://twitter.com/chidambara09/status/1218835047718866944
The Truth About Email/Web Security
symantec.com – Today’s baseline defenses require important determinations such as: The answer to those important questions requires both a strategy and a set of tools in place that can provide bankable solutions. B… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1218795946156359680