Posts Tagged ‘security’

Swiss-U.S. Privacy Shield Finalized

Swiss-U.S. Privacy Shield Finalized

On January 11, U.S. and Swiss authorities announced final agreement on the Swiss-U.S. Privacy Shield Framework. The Framework defines standards for handling personal data exported from Switzerland to the U.S. and enables U.S. companies to meet Swiss legal requirements to protect personal data transferred from Switzerland.


2016 Year-End E-Discovery Update

2016 Year-End E-Discovery Update

On the e-discovery vendor front, the pace of consolidation of large service providers in 2016 was unprecedented compared to prior years.


Public Cloud Has The Greatest Security Implications Say Execs

Public Cloud Has The Greatest Security Implications Say Execs

A new survey reveals that 65 percent of senior IT and security executives think that the biggest security risks for business come from public clouds.


Five Tips To Avoid Mistakes In Electronic Document Review

Five Tips To Avoid Mistakes In Electronic Document Review

I have seen hundreds of mistakes over the years, especially in the last decade when my work as a lawyer has been limited to electronic discovery. Many of these blunders were made by “the other side.” Some were funny and made me smile, others were not and led to motions of all kinds. Keeping it real, I have made my own fair share of errors too. Those lessons were painful, but are now deeply etched


NYDFS Proposes Revised Cybersecurity Requirements for Financial Services Companies

NYDFS Proposes Revised Cybersecurity Requirements for Financial Services Companies

The New York Department of Financial Services has released an extensively revised cybersecurity regulation applicable to the wide variety of financial services companies regulated by the NYDFS. Released on December 28, 2016, the revised regulation makes multiple changes to almost every provision in the original proposal.


Intelligence Assessment on Russian Activities and Intentions in Recent US Elections

Intelligence Assessment on Russian Activities and Intentions in Recent US Elections

The report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. It covers the motivation and scope of Moscow’s intentions regarding US elections and Moscow’s use of cyber tools and media campaigns to influence US public opinion.


Cybersecurity Best Practices: Eight Questions to Ask Your Organization

Cybersecurity Best Practices: Eight Questions to Ask Your Organization

A commitment to good cybersecurity and best practices is critical to protecting networks and systems. Here are some questions you may want to ask your organization to help prevent and mitigate against attacks.


Top Seven Cyberattack Mitigation Strategies

Top Seven Cyberattack Mitigation Strategies

The Department of Homeland Security (DHS) encourages network administrators to implement these recommendations below, which can prevent as many as 85 percent of targeted cyber-attacks.


DHS and FBI Joint Analysis Report on Russian Hacking

DHS and FBI Joint Analysis Report on Russian Hacking

Technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities.


Indictment Issued in Law Firm Hacks

Indictment Issued in Law Firm Hacks

Three Chinese citizens have been charged with hacking into the servers of two prominent – but unidentified – international law firms to steal confidential client information in connection with pending M&A deals.


A Critical Shift in Thinking About AI and Big Data

A Critical Shift in Thinking About AI and Big Data

Putting aside the dystopian views that sensationalize AI, bright prospects are ahead for corporations that embrace this transition to new ways of thinking. However, to make the leap, some radical adjustments in the ways of working are necessary.


Key Takeaways from the Newly Released GDPR Guidelines

Key Takeaways from the Newly Released GDPR Guidelines

The Article 29 Data Protection Working Party (WP29) recently held its December plenary meeting to discuss certain issues related to the implementation of the General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679), which will take effect in May 2018, and of the Privacy Shield, which was opened for self-certification by companies in August.


Protecting Financial Cyberspace

Protecting Financial Cyberspace

But as serious as these [recent] incidents are individually and collectively, none effectively illustrates the potential catastrophic consequences that cyber incidents can have when they transcend individual institutions, and affect our markets and financial systems.


​Google Chrome Will Block Thousands of Sites Using SHA-1 Certs from January 2017

​Google Chrome Will Block Thousands of Sites Using SHA-1 Certs from January 2017

Beginning January Google will start using full-page warnings in Chrome when the browser encounters sites using TLS/SSL or digital certificates signed with the aging SHA-1 hashing algorithm.


Canadian Observations in the Fall 2016 eDiscovery Business Confidence Survey

Canadian Observations in the Fall 2016 eDiscovery Business Confidence Survey

The survey results suggest that all parties building out eDiscovery services are feeling the impact of a competitive marketplace, namely; data volumes, budgetary constraints, and lack of personnel.


The UK’s Cybersecurity Regulatory Landscape: An Overview

The UK’s Cybersecurity Regulatory Landscape: An Overview

There are currently no mandatory reporting requirements under UK law specific to cybersecurity incidents except in relation to those communications service providers that are subject to the Privacy and Electronic Communications (EC Directive) Regulations 2003 (as amended).


How Data Analytics and Visualisation Revolutionised AML

How Data Analytics and Visualisation Revolutionised AML

Traditional technologies such as relational database management systems make it challenging, if not impossible, to process growing volumes of data and make it accessible, actionable and flexible to changing needs in terms of queries and analytics.


SaaS to the Max: The Limits of Shifting from On-site to Cloud Services

SaaS to the Max: The Limits of Shifting from On-site to Cloud Services

SaaS Benefit: Putting costs under operational expenses also affords companies better control of technology spending across the enterprise.


Cyber Privacy, Law and Governance in the Spotlight After U.S. Election

Cyber Privacy, Law and Governance in the Spotlight After U.S. Election

Throughout the election cycle, anxiety over cybersecurity was a central theme, raising issues that businesses and government will face for years to come.


Cybersecurity 2017 – The Year In Preview: HIPAA Compliance

Cybersecurity 2017 – The Year In Preview: HIPAA Compliance

Cloud services providers are subject to HIPAA as business associates even if they are unable to view PHI.


Three Ways Cybersecurity Can Put Your Firm Out of Business

Three Ways Cybersecurity Can Put Your Firm Out of Business

In an industry founded on the legal and ethical obligation to keep information confidential, a data breach erodes trust and may even be grounds for legal and regulatory actions.


3 Ways E-Discovery is Safer in the Cloud than On-Premise

3 Ways E-Discovery is Safer in the Cloud than On-Premise

Many firms have the mistaken impression that their data is safest where they can “touch” it and are hesitant to move it from on-premise to the cloud. Yet, law firms aren’t actually that confident about their own security.


Learning To Trust Cloud Security

Learning To Trust Cloud Security

Cloud-centric computing is inevitable because the network, not your network, is just a conduit to allow access from trusted requestors to trusted resources.


Do Lawyers Actually Realize When They’re Using the Cloud?

Do Lawyers Actually Realize When They’re Using the Cloud?

“Law firms that elect to avoid cloud-driven solutions with the intention of offering clients greater security may not actually be providing greater security.”