The FBI recommends medical and dental healthcare entities request their respective IT services personnel to check networks for FTP servers running in anonymous mode.
AI is also beginning to help managers peer into personal aspects of job performance that used to be left up to managers’ instincts and observations.
The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider.
Document review was just the beginning. In the past few years, corporate clients have shot dead another law-firm cash cow: the due diligence phase of a merger or acquisition.
The Security Audit Questionnaire from the EDRM was designed primarily to help evaluate the security capabilities of cloud providers and third parties offering electronic discovery or managed services.
When choosing a cloud service provider, it’s vital that the datacenter physically reside in a region or country in which data handling and storing legislation is favorable to your company’s business interests.
At JPMorgan Chase & Co., a learning machine is parsing financial deals that once kept legal teams busy for thousands of hours.
Kornbacher thinks privacy lawyers are poised to take on a bigger role in M&A deals, particularly during the due diligence phase.
Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature. This shows that the algorithm’s use for security-sensitive functions should be discontinued as soon as possible.
Many US companies may not realize that they might also have to comply with this new EU data security regulation. That’s because the GDPR applies to any business that holds data about, or which markets to individuals within the EU.
The Electronic Communications Privacy Act of 1986, a law passed before the widespread use of e-mail, instant messages and Internet-based social networks, doesn’t permit courts to require U.S.-based Internet service providers to turn over customer e-mails stored on servers outside the country.
Does the inevitable triumph of AI robots over human reason and logic mean that the legal profession is doomed? Will Watson be the next generation’s lawyer of choice? Ralph Losey does not think so and shares his thoughts on this important topic.
On January 11, U.S. and Swiss authorities announced final agreement on the Swiss-U.S. Privacy Shield Framework. The Framework defines standards for handling personal data exported from Switzerland to the U.S. and enables U.S. companies to meet Swiss legal requirements to protect personal data transferred from Switzerland.
On the e-discovery vendor front, the pace of consolidation of large service providers in 2016 was unprecedented compared to prior years.
A new survey reveals that 65 percent of senior IT and security executives think that the biggest security risks for business come from public clouds.
I have seen hundreds of mistakes over the years, especially in the last decade when my work as a lawyer has been limited to electronic discovery. Many of these blunders were made by “the other side.” Some were funny and made me smile, others were not and led to motions of all kinds. Keeping it real, I have made my own fair share of errors too. Those lessons were painful, but are now deeply etched
The New York Department of Financial Services has released an extensively revised cybersecurity regulation applicable to the wide variety of financial services companies regulated by the NYDFS. Released on December 28, 2016, the revised regulation makes multiple changes to almost every provision in the original proposal.
The report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. It covers the motivation and scope of Moscow’s intentions regarding US elections and Moscow’s use of cyber tools and media campaigns to influence US public opinion.
A commitment to good cybersecurity and best practices is critical to protecting networks and systems. Here are some questions you may want to ask your organization to help prevent and mitigate against attacks.
The Department of Homeland Security (DHS) encourages network administrators to implement these recommendations below, which can prevent as many as 85 percent of targeted cyber-attacks.
Technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities.
Three Chinese citizens have been charged with hacking into the servers of two prominent – but unidentified – international law firms to steal confidential client information in connection with pending M&A deals.
Putting aside the dystopian views that sensationalize AI, bright prospects are ahead for corporations that embrace this transition to new ways of thinking. However, to make the leap, some radical adjustments in the ways of working are necessary.
The Article 29 Data Protection Working Party (WP29) recently held its December plenary meeting to discuss certain issues related to the implementation of the General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679), which will take effect in May 2018, and of the Privacy Shield, which was opened for self-certification by companies in August.