investinestonia.com – “Nobody can be safe in digital space unless they have a passport. We do expect that our road space is protected by people being identified and identifiable, if needed,” president Kaljulaid said in th… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1302672628340097024
ESG Webinar: XDR and Beyond with Autonomous Breach Protection
cynet.easywebinar.live – Extended Detection and Response (XDR) is garnering a lot of attention in the security world. The new technology promises to unify multiple prevention, detection and response technologies into a singl… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1302604549031514114
Relativity Partner Benefits | Relativity
relativity.com – Help your team work faster and smarter with purpose-built solutions and training. Powerful tools and ideas for integration can show you the way. Leverage our partners’ technical prowess in Relativity… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1302713278423072768
Stellar Women in e-Discovery | Podcast | Relativity
relativity.com – For this episode, we got to chat to the 2019 Stellar Women Innovation Award winner, Stephanie Clerkin! Stephanie is well known for her vivacious social media presence as well as her deep industry kno… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1302622827779182592
ISMG Virtual Roundtable Discussion: US Retail
events.ismg.io – As the retail industry re-emerges, companies are evaluating long-term operating models, re-engineering processes and investing in systems and technologies such as automation and next-generation suppl… Tweeted by @ISMG_News https://twitter.com/ISMG_News/status/1302947224985329664
Google Fixed A Dangerous Gmail Bug That Allowed Email Spoofing
forbes.com – A dangerous bug discovered by a security researcher this spring could have allowed attackers to abuse Google’s Gmail service. If properly exploited, bogus emails could be sent from real Gmail address… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1302260928080211971
Innovation Awards 2020: Vote for our Individual Winners
relativity.com – Each year at the Relativity Innovation Awards, we recognize organizations and individuals who build innovative solutions, break down barriers for technology in the practice of law, move e-discovery f… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1302350911310893057
Surging CMS attacks keep SQL injections on the radar during the next normal
helpnetsecurity.com – Every year, millions of websites across the world fall victim to malware attacks that are designed to gain access to the site’s backend without the administrator’s knowledge in order to steal sensiti… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1302489164315795457
Communication Tips to Help Your Workplace Thrive — Online and Off
reworked.co – From all-hands-on-deck meetings to company-wide memos and project updates in collaboration applications, organizational communications keep businesses running. But effective communications — which in… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1302592400309837826
Companies continue to expose unsafe network services to the internet
helpnetsecurity.com – 33% of companies within the digital supply chain expose common network services such as data storage, remote access and network administration to the internet, according to RiskRecon. In addition, or… Tweeted by @cyentiainst https://twitter.com/cyentiainst/status/1302499538507386880
Preparing for a virtual panel and recording a remote interview
chrisdaleoxford.com – If this week has been short on visible output, it has been a busy one for the preparation of things to come. On Tuesday, we had the prep call for the International Panel at Relativity Fest. Relativit… Tweeted
A Tempo of (Anti) Trust? Hart-Scott-Rodino Act Filings in 2020
complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the recent post highlighting real-time monthly HSR Act filing reporting by the FTC. Editor’s Note: Taken from the latest published Ha… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1301873128608595973
Sean O’Shea: Tips for Paralegals and Litigation Support Professionals – August 2020
blog.aceds.org – 8/1/2020: Maryland Court of Appeals on Social Media Authentication In Griffin v. State, 419 Md. 343 (2011), the Maryland Court of Appeals found social media evidence must be shown to have not been su… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1301203769800241154
The Hidden Costs of Losing Security Talent
darkreading.com – Companies know that security talent costs money and good people are hard to find. But what they don’t always consider are the hidden costs of losing an experienced security analyst. According to Simo… Tweeted by @pmenonkp https://twitter.com/pmenonkp/status/1301420747701858304
New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data
thehackernews.com – Cybercriminal groups are constantly evolving to find new ways to pilfer financial information, and the latest trick in their arsenal is to leverage the messaging app Telegram to their benefit. In wha… Tweeted by @B01Group https://twitter.com/B01Group/status/1301419720671997953
Enroll Penetration Testing Labs Online Course 2020
hackersonlineclub.com – Real practical hands on hacking skills from a top professional pentester using labs. Enroll for $65 only – 87% off price on offer Looking for Powerpoint slides and lectures that will put you to sleep… Tweeted by @HOCupdate
Third-Party Risk Management: How to Grow a Mature Program
bankinfosecurity.com – Enterprises globally recognize the challenge of third-party cyber risk, but they still struggle with the risk management. Dave Stapleton of CyberGRX discusses the elements of a mature program, includ… Tweeted by @ISMG_News https://twitter.com/ISMG_News/status/1301398072702849024
Arbitrations Are on the Rise: What Does This Mean for eDiscovery in the UK?
eventbrite.com – Eventbrite, and certain approved third parties, use functional, analytical and tracking cookies (or similar technologies) to understand your event preferences and provide you with a customized experi… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1300894475758243840
One Ethics Rule Leads to Another: Technology Competence and the Duty of Supervision
blog.aceds.org – There are two ways lawyers can satisfy their ethical duty of technology competence. One way is by learning about technology and becoming more proficient in the use of legal tech tools. The other is b… Tweeted by @acedsonline
Why Having a Secure Remote Environment Is More Critical Today Than Ever Before
entrepreneur.com – Recent events have exposed a number of kinks in the armor of enterprise-level cybersecurity the world over. Suddenly, organizations that had invested billions in securing their networks and buildings… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1301146122686287873