netdiligence.com – In the event of a cyber attack, failure to act in accordance with best practices and relevant legislation can result in a loss of business income and reputation damage, but also steep financial penal… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1276216250327326721
NetDiligence Summer Summit Begins with Cyber Safe Tips from NortonLifeLock
netdiligence.com – With the Virtual Summer Summit only days away, NetDiligence Global Events and Programming kicked off with a preview event, Cyber Smart Webinar, broadcast on June 24, 2020. The program featured speake… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1276164383807324161
Stellar Women in e-Discovery: Candice Corby
relativity.com – Editor’s Note: Because Stellar Women in e-Discovery operates on its own publication schedule, you may notice an episode or two missing from our blog coverage of the show. To ensure you don’t miss any… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1276229302414118913
Big Law Branches Out: Firm Subsidiaries Want a Piece of the $10B ALSP Market
law.com – Analysis Big Law Branches Out: Firm Subsidiaries Want a Piece of the $10B ALSP Market Faced with an expanding field of competitors, law firms are branching out, forming ancillary businesses that they… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1276478350089912321
Understanding Electronically Stored Information
complexdiscovery.com – What is Electronically Stored Information? Electronically stored information, or ESI, is described by the EDRM as information stored electronically on enumerable types of media regardless of the orig… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1275918683479646208
Why Current Cyber Risk Management Techniques Are Inadequate
insurancejournal.com – Insurers have been blindly moving to expand access and coverage in cyber insurance despite their inability to confidently assess and quantify holistic cyber risk. Visibility of the exposure remains p… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1275838239719469058
DSAR Best Practices and Workflows an Organization Should Follow | JD Supra
jdsupra.com – In my latest post, I outlined the process involved in the actual response to DSAR requests. In my last article of this series, I will discuss the best practices and workflows that your organization s… Tweeted by @acedsonline
Does Checking Sports Scores or TikTok on a Work Computer Violate Federal Law?
relativity.com – What would happen if seemingly innocuous things almost everyone does at work suddenly became a serious violation of federal law? March Madness, the NCAA Division 1 Men’s Basketball is a big deal. One… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1275867170656878592
3 Common Communication Surveillance Challenges and How to Tackle Them
relativity.com – Collusion, insider trading, and other illegal behaviors aren’t explicitly described in emails, chats, voicemails, and other digital communications between bad actors. Compliance teams know they need … Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1275791576510455809
Data Lakes: An Important Technological Approach for Data and Legal Discovery
complexdiscovery.com – Editor’s Note: Data lakes provide an architectural approach for storing high-volume, high-velocity, and high-variety data. This storage approach is of increasing interest to business, information tec… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1275551230421610496
Law Firms Are Not Tech Companies—And It’s Time They Stopped Trying To Be
law.com – As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news… Tweeted by @ComplexD
9 tips to detect and prevent web shell attacks on Windows networks
csoonline.com – One tool that bad guys use to go after your web servers is a web shell. A web shell is a malicious script that masquerades as a legitimate file and provides a backdoor into your server. Recent guidan…
Lawyers as Defendants: Email Exposed as Crime-Fraud Negates Attorney-Client Privilege
relativity.com – Editor’s Note: This article was first published in Legaltech News. Student loan servicers are the companies people love to hate. Our European friends are appalled at the high cost of higher education… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1275739701559865344
What is the Structure of the Typical SaaS Company as it Scales?
tomtunguz.com – This post is part of a series leading up to SaaS Office GTM Edition on June 24 in which we’re reviewing the results of the 2020 Redpoint GTM survey. Today, we’re answering the question: how do teams …
EasyJet hacking attack: are you affected and what should you do?
theguardian.com – EasyJet revealed on Tuesday it had suffered a “highly sophisticated” cyber-attack. It comes at a time of heightened concern about a surge in online and phone scams linked to the coronavirus pandemic.… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1275199132295204865
WHO reports fivefold increase in cyber attacks, urges vigilance
who.int – Since the start of the COVID-19 pandemic, WHO has seen a dramatic increase in the number of cyber attacks directed at its staff, and email scams targeting the public at large. This week, some 450 act… Tweeted by
DSAR Best Practices and Workflows an Organization Should Follow
blog.aceds.org – In my latest post, I outlined the process involved in the actual response to DSAR requests. In my last article of this series, I will discuss the best practices and workflows that your organization s… Tweeted by @acedsonline
A Summer Treat for the eDiscovery Ecosystem? AWS Announces General Availability of AWS Snowcone
complexdiscovery.com – Editor’s Note: Announced late last week by Amazon Web Services (AWS), the world’s most widely adopted cloud platform, AWS Snowcone is a small, ultra-portable, rugged, and secure edge computing device… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1275413448147509253
Using a Privacy-First Mindset to Transform Data into Intelligence
securitymagazine.com – The Data Economy is currently a $230B+ market and expected to grow to $400B in the next four years. However, 80 percent of current spend is still limited to advertising use cases. It is expected that… Tweeted by
Why Did the Litigation Support Professional Cross the Road?
relativity.com – Something happens to your sense of humor when you become a father. Maybe it’s a constraint fatherhood puts on your time that prevents you from keeping up with edgy humor. Maybe it’s the time spent wi… Tweeted by