Skip to content
E-Discovery Calculators

E-Discovery Calculators

#D4DE

Menu

  • Home
    • E-Discovery Calculator
    • Doc Review Calculator
  • Discover More
    • News
    • Daily Industry Updates
    • Blog
    • Resources
    • Contact Us
    • Login
    • Weekly Wins

Month: June 2020

How To Analyse And Capture The Packets in Wireshark

hackersonlineclub.com – Wireshark is an open source software project and you can freely use Wireshark on any number of computers you like, without worrying about license keys or fees or such. All source code is freely avail… Tweeted by @HOCupdate

morethandiscovery June 8, 2020 Uncategorized Read more

IoT Security in the Era of COVID-19

cxotoday.com – In the fight against COVID-19, technology innovations are steadily making a difference to healthcare systems. The pace of innovation in Internet of Things (IoT) systems, in particular, to track infec… Tweeted by @1nterestingTech https://twitter.com/1nterestingTech/status/1269971557130043394

morethandiscovery June 8, 2020 Uncategorized Read more

Patent Office Say Artificial Intelligence Cannot be An Inventor

ridethelightning.senseient.com – CNN reported on April 30 that the US Patent Office has denied a pair of patents filed on behalf of DABUS, an artificial intelligence system, and published a ruling that says US patents can only be gr… Tweeted

morethandiscovery June 8, 2020 Uncategorized Read more

4 Trending Phishing Techniques and Tips for Detection

logrhythm.com – No other cyberthreat plagues the world like phishing attacks. This email-borne threat action tops the list as the most used initial attack vector in data breaches today[1]. Your team must have a stra… Tweeted by @LogRhythm https://twitter.com/LogRhythm/status/1269895447101018112

morethandiscovery June 8, 2020 Uncategorized Read more

The Ultimate Guide to AWS, Azure and GCP Cloud Asset Visibility

infosecurity-magazine.com – It’s becoming ever-more common for organisations of all sizes to deploy at least a portion of their computing infrastructure in the cloud. First seen as a cost-saving strategy, the cloud is now lever… Tweeted by @InfosecurityMag https://twitter.com/InfosecurityMag/status/1269318136186245131

morethandiscovery June 7, 2020 Uncategorized Read more

A new firewall: multifamily data privacy and security

yieldpro.com – In the wake of increased and intensified data breaches, legislators are moving to protect their constituents. On June 28, 2018, California passed the most comprehensive consumer privacy law in the Un… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1269466268026929152

morethandiscovery June 7, 2020 Uncategorized Read more

How to avoid ransomware attacks: 10 tips

network-midlands.co.uk – Nigerian princes are no longer the only menaces lurking in an employee’s Inbox. Ransomware attacks – an especially sinister type of malware delivered through spear phishing emails that locks up valua… Tweeted by @networkmidlands https://twitter.com/networkmidlands/status/1269479338749169664

morethandiscovery June 7, 2020 Uncategorized Read more

Cisco IOS Routers Bugs Let Remote Hackers Take Control of the Systems

gbhackers.com – Recently, Cisco has announced that it has fixed many vulnerabilities in Cisco IOS Routers, including more than a dozen vulnerabilities that are affecting the company’s industrial routers and switches. Tweeted by @abu7ala1 https://twitter.com/abu7ala1/status/1269622394014097410

morethandiscovery June 7, 2020 Uncategorized Read more

Indian video on demand giant ZEE5 has been hacked

securityaffairs.co – A hacker that goes online with the moniker “John Wick” and “Korean Hackers” claim to have hacked the Indian video on demand giant ZEE5 and now is threatening to sell the database on cybercrime market… Tweeted by @LudovicoLoreti

morethandiscovery June 7, 2020 Uncategorized Read more

California AG Submits Proposed Regulations for Approval Under the CCPA

complexdiscovery.com – Press Announcement from State of California Department of Justice (June 2, 2020) Attorney General Becerra Submits Proposed Regulations for Approval Under the California Consumer Privacy Act Californi… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1268546818692001794

morethandiscovery June 5, 2020 Uncategorized Read more

DSARs 101: What to Expect When Doing Business with EU Customers

blog.aceds.org – For any organization that deals with privacy issues in the European Union and other privacy-centric jurisdictions like the United Kingdom, an effective information governance program is a must. A pro… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1268555544324964355

morethandiscovery June 5, 2020 Uncategorized Read more

7 innovative ways to find scarce IT talent

cio.com – Analytics, artificial intelligence, the internet of things and numerous other forms of technology disruption are leading to a shortage of qualified experts in fields ranging from software development… Tweeted by @IndianRootsCom https://twitter.com/IndianRootsCom/status/1268881121418362880

morethandiscovery June 5, 2020 Uncategorized Read more

Decision of the German Federal Court of Justice on Planet49

fieldfisher.com – We have waited a long time for this and now here it is – the decision of the German Federal Court of Justice (FCJ) in relation to the so-called “Planet 49” case. The origin of the case was

morethandiscovery June 5, 2020 Uncategorized Read more

Understanding cyber threats to APIs

helpnetsecurity.com – This is the fourth of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, and protection. The many … Tweeted by @CyberSecurityN8 https://twitter.com/CyberSecurityN8/status/1268862917077762048

morethandiscovery June 5, 2020 Uncategorized Read more

Evaluating Corporate Compliance Programs? Updated DOJ Criminal Division Guidance

complexdiscovery.com – Editor’s Note: The Criminal Division earlier this month announced the release of a guidance document for white-collar prosecutors on the evaluation of corporate compliance programs. The document, ent… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1268223873134329858

morethandiscovery June 4, 2020 Uncategorized Read more

Data Discovery And Privacy Startup 1touch Raises $14M

nocamels.com – Israeli startup 1touch.io, a provider of data discovery, privacy, and security solutions, announced on Wednesday that it raised $14 million in a Series A round from leading investors including Nation… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1268519762398711811

morethandiscovery June 4, 2020 Uncategorized Read more

A Cybersecurity Self Check? Medical Facilities Best Practice Test Criteria for Article 32 GDPR

complexdiscovery.com – Editor’s Note: Developed and published by the Bavarian State Commissioner for Data Protection (BayLfD) and the Bavarian State Office for Data Protection Supervision (BayLDA), this paper is shared to … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1267892318868299783

morethandiscovery June 3, 2020 Uncategorized Read more

Sean O’Shea: Tips for Paralegals and Litigation Support Professionals – May 2020 | JD Supra

jdsupra.com – 5/1/2020: (California Styling) The California style is distinguished by enclosing citations in parentheses and putting the venue and year between the case name and reporter cite. 5/2/2020: Predicting… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1267852205333364741

morethandiscovery June 3, 2020 Uncategorized Read more

The Increasing Promise of Technology-Assisted Review: How to Tame the Vulgar Expense of E-Discovery

blog.aceds.org – In my first major case using technology-assisted review, our team had to review documents in Korean, which brought with them privacy and cross-border transfer concerns. The technology was very helpfu… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1267852252687085571

morethandiscovery June 3, 2020 Uncategorized Read more

Newly Patched SAP ASE Flaws Could Let Attackers Hack Database Servers

thehackernews.com – A new set of critical vulnerabilities uncovered in SAP’s Sybase database software can grant unprivileged attackers complete control over a targeted database and even the underlying operating system i… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1268165993588764676

morethandiscovery June 3, 2020 Uncategorized Read more
  • « Previous
  • Next »

Archives

  • November 2023 (5)
  • April 2023 (13)
  • March 2023 (152)
  • February 2023 (140)
  • January 2023 (152)
  • December 2022 (148)
  • November 2022 (140)
  • October 2022 (153)
  • September 2022 (30)
  • August 2022 (153)
  • July 2022 (30)
  • June 2022 (55)
  • May 2022 (95)
  • April 2022 (115)
  • March 2022 (134)
  • February 2022 (140)
  • January 2022 (127)
  • December 2021 (96)
  • November 2021 (89)
  • October 2021 (128)
  • September 2021 (83)
  • August 2021 (97)
  • July 2021 (112)
  • June 2021 (111)
  • May 2021 (94)
  • April 2021 (69)
  • March 2021 (29)
  • February 2021 (73)
  • December 2020 (5)
  • November 2020 (100)
  • October 2020 (107)
  • September 2020 (85)
  • August 2020 (128)
  • July 2020 (128)
  • June 2020 (128)
  • May 2020 (102)
  • April 2020 (90)
  • March 2020 (99)
  • February 2020 (83)
  • January 2020 (97)
  • December 2019 (102)
  • November 2019 (95)
  • October 2019 (64)
  • September 2019 (71)
  • August 2019 (47)
  • July 2019 (58)
  • June 2019 (59)
  • May 2019 (54)
  • April 2019 (45)
  • March 2019 (69)
  • February 2019 (44)
Copyright © 2025 E-Discovery Calculators. All rights reserved. Theme Spacious by ThemeGrill. Powered by: WordPress.