Posts Tagged ‘security’

Time to Upgrade Data Loss Prevention to DLP 2.0

Time to Upgrade Data Loss Prevention to DLP 2.0

The good news is that existing DLP can easily be enhanced with other technology that can fill in the gaps and enable it to play to its strengths – essentially upgrading it to “DLP 2.0”.


The Internet of Things Meets the Four Stages of Attorney E-Grief

The Internet of Things Meets the Four Stages of Attorney E-Grief

Lawyers confront disruptive technologies by pretending they don’t exist, like those firms who advised clients to steer clear of cloud computing or the multitudes spending millions of client dollars to contort electronic data into printed, paginated documents.


‘Loose Tweets Sink Fleets’: How to Create Social Checks and Balances

'Loose Tweets Sink Fleets': How to Create Social Checks and Balances

As many have learned the hard way, placing information on a company intranet, extranet or the internet can open up a world of unintended consequences.


Multi-Tenant Data Architecture

Multi-Tenant Data Architecture

Trust, or the lack thereof, is the number one factor blocking the adoption of software as a service (SaaS). A case could be made that data is the most important asset of any business—data about products, customers, employees, suppliers, and more.


Taking a Multifaceted Approach to Cyber-Security

Taking a Multifaceted Approach to Cyber-Security

“It’s a chaotic and confusing environment. There are multiple threat vectors, increasingly sophisticated and effective attacks, and a general lack of security standards.”


HIPAA Data Breaches: What Covered Entities Must Know

HIPAA Data Breaches: What Covered Entities Must Know

Covered entities and their business associates need to understand the basics of how HIPAA data breaches are determined, and what they can do to keep information secure.


Why is Big Data so Dangerous?

Why is Big Data so Dangerous?

Big Data is one of the most potentially dangerous and destructive new technologies to come about in the last century. While a new fighter jet or a new type of bomb can certainly wreck havoc, big data has the potential to insidiously undermine and subtly (and not-so-subtly) change almost every aspect of modern life.


The Experts Speak: The Summer 2016 eDiscovery Business Confidence Survey Results

The Experts Speak: The Summer 2016 eDiscovery Business Confidence Survey Results

The eDiscovery Business Confidence Survey is a non-scientific quarterly survey designed to provide insight into the business confidence level of individuals working in the eDiscovery ecosystem. The term ‘business’ represents the economic factors that impact the creation, delivery, and consumption of eDiscovery products and services.


Cloud Migration Dollars and Sense

Cloud Migration Dollars and Sense

The only times enterprises run into issues with cloud costs, deployment or other issues is when they try and completely “DIY.” Cloud may have radically democratized solution availability, but there are still complexities in the selection, installation and management process that should not be overlooked.


Consilio Announces Acquisition of eDiscovery Services Provider EQD

Consilio Announces Acquisition of eDiscovery Services Provider EQD

Consilio, a global leader in eDiscovery, document review and legal consulting services, has announced the acquisition of EQD, a Houston-based eDiscovery, document review and litigation support services provider.


Perhaps the Most Meaningful eDiscovery Business Confidence Survey Results Yet: eDiscovery Trends

Perhaps the Most Meaningful eDiscovery Business Confidence Survey Results Yet: eDiscovery Trends

The results are in from the ACEDS and Complex Discovery Summer 2016 eDiscovery Business Confidence Survey.


Unfiltered Results of the Summer 2016 eDiscovery Business Confidence Survey

Unfiltered Results of the Summer 2016 eDiscovery Business Confidence Survey

The eDiscovery Business Confidence Survey is a non-scientific quarterly survey designed to provide insight into the business confidence level of individuals working in the eDiscovery ecosystem. The term ‘business’ represents the economic factors that impact the creation, delivery, and consumption of eDiscovery products and services.


Should My Company Self-Certify Under The EU–US Privacy Shield?

Should My Company Self-Certify Under The EU–US Privacy Shield?

Certification is not a mere formality without potential exposure. Once a company self-certifies, the Privacy Shield requirements will become enforceable against that company under U.S. law.


2016 ILTA/InsideLegal Technology Purchasing Survey

2016 ILTA/InsideLegal Technology Purchasing Survey

International Legal Technology Association (ILTA), and InsideLegal, the insider’s guide to doing business in legal technology, today released the findings of the “2016 ILTA/InsideLegal Technology Purchasing Survey”


CIO Explainer: What Is Blockchain?

CIO Explainer: What Is Blockchain?

Known by many as the technology underpinning the bitcoin digital currency, blockchain has acquired a new identity in the enterprise.


This Is Your Company on Blockchain

This Is Your Company on Blockchain

True believers say blockchain could reduce the need for businesses to organize as companies, which get work done via command and control. Using blockchain, they say, collaborators will be able to work together as free agents instead of under a hierarchy of bosses.


Identifying the Best Cloud Practices for Your Organization

Identifying the Best Cloud Practices for Your Organization

The legal practitioners’ security debate focuses on whether the legal world should be using cloud or cloud-like offerings during the course of their practice—whether that practice is as part of an in-house legal team or with a firm.


Ponemon Study Points to Risks of Visual Hacking, or ‘Shoulder Surfing’

Ponemon Study Points to Risks of Visual Hacking, or 'Shoulder Surfing'

Whether you call it ‘shoulder surfing,’ or just plain eavesdropping, new research from 3M and the Ponemon Institute outlines the risks of visual hacking.


Encryption Basics: How It Works & Why You Need It

Encryption Basics: How It Works & Why You Need It

If you’ve been putting off adopting encryption as a part of your security policy, delay no more. Here’s a guide to the science of encryption, and how you can begin implementing an encryption strategy today.


EDRM Announces Security Audit Project

EDRM Announces Security Audit Project

EDRM, the leading standards organization for the e-discovery market, announced today the establishment of a new project to develop and provide a security survey.


Visibility is a Trap: Panopticism, E-Discovery, and the Rich Kids of Instagram

Visibility is a Trap: Panopticism, E-Discovery, and the Rich Kids of Instagram

More and more, social media is being used as evidence against the wealthy in cases of fraud, according to a recent article in The Telegraph, which states that, according to leading cybersecurity firms, “social media posts are used as evidence in around 75 per cent of all litigation cases.”


Ponemon: Cloud Adoption Grows as Security Lags

Ponemon: Cloud Adoption Grows as Security Lags

Cloud adoption is growing, but companies aren’t taking security into account the way they should. A fresh Ponemon Institute survey shows that many businesses simply aren’t adopting appropriate governance and security measures to protect sensitive data in the cloud.


Epiq Systems Reaches Agreement to be Acquired

Epiq Systems Reaches Agreement to be Acquired

Epiq will become a privately-held company and will be combined with DTI, a leading global legal process outsourcing (LPO) company majority-owned by OMERS and managed by OMERS Private Equity.


Is Encryption the Key to Your Data Security?

Is Encryption the Key to Your Data Security?

Large and small businesses are looking to additional forms of security to protect themselves and their customers from unauthorized access.