complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the recently updated Cyber Law Toolkit published by the NATO Cooperative Cyber Defence Centre of Excellence (NATO CCDCOE). Editor’s N… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1322531235093204992
Zero Trust Cybersecurity: ‘Never Trust, Always Verify’
nist.gov – Huh? What? At least that was my response the first time I heard the words “zero trust” when I started working at the National Institute of Standards and Technology (NIST) National Cybersecurity Cente… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1322510886737727488
4 Must-Use Tips for Effective Communication with Clients and Colleagues
relativity.com – Whether you’re talking to a colleague, a customer, or a companion, it’s not just what you say—it’s how you say it. Recently, we shared insights from a Relativity Fest 2020 session on delivering excep… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1321916002452545536
How Sky Discovery Uncovers the Value of Visual Data–Within Budget
relativity.com – Editor’s Note: Anderson Hind, director of technology at Sky Discovery, also contributed as an author on this piece. Not every fact in e-discovery can be uncovered with words. A few years ago, our tea… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1321836924882112512
Kangaroo Court: Data, Time, and AI in the M&A Process
blog.aceds.org – Whatever the type of M&A transaction, there is always the possibility that information may slip through the cracks. The growth in size and type of data exchanging hands throughout this process means … Tweeted by @acedsonline https://twitter.com/acedsonline/status/1321822855793938432
Australian Privacy Principles quick reference
oaic.gov.au – Open and transparent management of personal information Ensures that APP entities manage personal information in an open and transparent way. This includes having a clearly expressed and up to date A… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1321254325679726600
Whaling Attacks are on the Rise
keepnetlabs.com – As cyber threats are evolving, the companies around the world are getting extra security solutions to combat against them. Whaling is also one of the cyber attack vectors that evolved in the last cou… Tweeted by @keepnetlabs https://twitter.com/keepnetlabs/status/1321187475553980417
How to Identify Your Organization’s eDiscovery Architect
blog.aceds.org – Often times we get caught up on material price (or line item pricing) and projects become penny-wise and pound-foolish. As Doug Austin cited in this article, budgetary constraints are now one of the … Tweeted by @acedsonline https://twitter.com/acedsonline/status/1321150260866093056
Attacks on IoT devices continue to escalate
helpnetsecurity.com – Attacks on IoT devices continue to rise at an alarming rate due to poor security protections and cybercriminals use of automated tools to exploit these vulnerabilities, according to Nokia. The report… Tweeted by @m2mdataconnect https://twitter.com/m2mdataconnect/status/1321391409149214722
TrickBot Linux Variants Active in the Wild Despite Recent Takedown
thehackernews.com – Efforts to disrupt TrickBot may have shut down most of its critical infrastructure, but the operators behind the notorious malware aren’t sitting idle. According to new findings shared by cybersecuri… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1321365965196554241
Resetting the Baseline? eDiscovery Market Size Adjustments for 2020
complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the newly published overview of eDiscovery market size adjustments stemming from the unanticipated pandemeconomic conditions of 2020.… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1320794508645289990
5 persistent challenges security pros face
csoonline.com – The fourth annual Life and Times of Cybersecurity Professionals report from ESG and the Information Systems Security Association (ISSA) is out and available for free download here. The report is choc… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1320735539637768196
Industries – GeoLang
geolang.com – In addition, code forms part of the high value data and intellectual property of this sector. As with manufacturing, new knowledge, knowhow and the information that underpins registered intellectual … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1321074573098536960
President Niinistö: “This affects all of us”
yle.fi – President Sauli Niinistö said on Sunday a recent psychotherapy centre data breach is an especially cruel crime. “This affects all of us,” Niinistö said. “Data is continually gathered from all of us a… Tweeted by @EeHRN https://twitter.com/EeHRN/status/1320490857091518466
Experts Warn of Privacy Risks Caused by Link Previews in Messaging Apps
thehackernews.com – Cybersecurity researchers over the weekend disclosed new security risks associated with link previews in popular messaging apps that cause the services to leak IP addresses, expose links sent via end… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1320705299473313792
Finnish psychotherapy center Vastaamo suffered a shocking security breach
securityaffairs.co – Finland’s interior minister summoned an emergency meeting Sunday after the private Finnish psychotherapy center Vastaamo suffered a security breach that caused the exposure of patient records. To wor… Tweeted by @securityaffairs https://twitter.com/securityaffairs/status/1320695787962142721
Customizing your package-library location
r-bloggers.com – For reasonably experienced R users this simple topic might not seem worthy of a blog post, so if you are not an R beginner, you may want to skip this post. Having that said, I have had to
Alcide integrates with AWS Security Hub to send alerts on risks to Kubernetes deployments
helpnetsecurity.com – Alcide announced the company’s security solutions are now integrated with AWS Security Hub, sending real-time threat intelligence and compliance information to Amazon Web Services (AWS) for easy cons… Tweeted by @BigData_Fr https://twitter.com/BigData_Fr/status/1320623665067732992
Incident & Breach Management Products | Products | OneTrust
onetrust.com – OneTrust Incident & Breach Response helps centrally manage incidents, automate tasks, and maintain records for compliance and notification with global laws. The tool is powered by the Databreachpedia… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1320119832654864384
PI/PII Inventory
bigid.com – BigID takes a new machine learning based approach to personal data discovery that is focused on personal information – leveraging identity intelligence and machine learning to deliver an accurate and… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1320123162386976769