Posts Tagged ‘security’

Your Employees Are Probably Doing It, So Have a BYOD Policy

Your Employees Are Probably Doing It, So Have a BYOD Policy

All employers, large and small, should consider developing and implementing a BYOD policy to beef up security and protect sensitive business information.


How Internal Audit Can Help Manage 10 Top Technology Risks

How Internal Audit Can Help Manage 10 Top Technology Risks

“The technology risks we face today are increasingly complex, and a sophisticated, well-thought-out approach is required to manage them.”


4 Takeaways from the InsideLegal and ILTA Purchasing Survey

4 Takeaways from the InsideLegal and ILTA Purchasing Survey

The 2015 InsideLegal and ILTA Purchasing survey is out and provides a 10,000 foot view of insights from senior legal tech professionals as to budgets, opportunities and challenges facing the ILTA community.


ILTACON Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

ILTACON Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


DoD’s New Cybersecurity and Cloud Standards and Reporting Requirements

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

The DoD rules’ basic requirement is that contractors storing or using “covered defense information” must provide “adequate security” for that information. All DoD contractors are covered by the interim rule – no exception is provided for small businesses.


2015 ILTA/InsideLegal Technology Purchasing Survey

2015 ILTA/InsideLegal Technology Purchasing Survey

2015 ILTA/InsideLegal Tech Purchasing Survey: Detailed technology budget data; updated information on firms’ purchasing influences and patterns; legal IT department trends and challenges; and expansive sections on specific legal technology purchases.


KMWorld Trend-Setting Products of 2015

KMWorld Trend-Setting Products of 2015

Throughout the yearlong collaborative judging process, we looked at more than 200 vendors, whose combined product lineups include more than 1,000 separate offerings.


Cloud Best Practices: Tokenization 101

Cloud Best Practices: Tokenization 101

By Michael Higashi What is tokenization? Put simply, tokenization enables enterprises to make use of cloud-based applications without having to transmit sensitive data values to the cloud. Tokenization substitutes randomly generated values in place of the actual data. Those values can then be stored in the cloud while the original data remains housed on a […]


3 Financial Lessons Hacking Scandals Have Taught Us

3 Financial Lessons Hacking Scandals Have Taught Us

Sensitive information is apparently hard to keep that way these days. It seems as if there’s a new hacking scandal every few weeks, leading folks to wonder if anything can ever be secure.


How Private is Your Private Data When It Comes to eDiscovery?

How Private is Your Private Data When It Comes to eDiscovery?

The very nature of the information being collected generally makes it an area that is ripe with juicy content. The information has already been deemed worthy for some type of investigation, lawsuit, or criminal matter – eDiscovery deals with mass amounts of information, a treasure trove of potentially privileged data both personal and corporate.


Phishing Education Can Save Nearly $4m Annually

Phishing Education Can Save Nearly $4m Annually

The Cost of Phishing and Value of Employee Training revealed that majority of phishing costs are due to loss of employee productivity and uncontained credential compromises. When added to other factors, these can cost an average sized company $3.77 million per year.


Firms Must Improve Third-Party Vendor Management

Firms Must Improve Third-Party Vendor Management

study shows that there’s been little change in the way companies in various industries manage their third-party vendors—and there’s vast room for improvement.


Content Analytics and Autoclassification: Addressing the Chaos

Content Analytics and Autoclassification: Addressing the Chaos

Content analytics is fast becoming a pivotal business tool, with six in 10 enterprises saying it will be essential within five years’ time.


Government Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

Government Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


German Federal IT Committee Issues New Restrictions for Cloud Service Providers

German Federal IT Committee Issues New Restrictions for Cloud Service Providers

Last month the German Federal Government IT Advisory Committee (” Federal IT Committee “) issued new cloud computing service criteria for all prospective vendors to German Federal Agencies. Cloud services providers who offer, or are considering offering, cloud computing services to relevant German Federal Agencies should plan proactively for these restrictive requirements and think of […]


NIST Requests Input on Revised Cryptographic Standards

NIST Requests Input on Revised Cryptographic Standards

NIST is primarily interested in the risks and benefits of transitioning—in whole or in part—to a competing standard developed by the International Standards Organization and International Electrotechnical Commission: ISO/IEC 19790:2012.


Law Firm Threat Info-Sharing Group Goes Live

Law Firm Threat Info-Sharing Group Goes Live

Dark Reading reported last week that The Legal Services Information Sharing and Analysis Organization (LS-ISAO) Services had been launched with the help of the financial services industry whose 15-year-old Financial Services Information Sharing and Analysis Center (FS-ISAC) is considered one of the most mature ISAC/ISAO groups today.


Magic Quadrant for Structured Data Archiving and Application Retirement

Magic Quadrant for Structured Data Archiving and Application Retirement

Via Wortzmans Structured data archiving technologies help IT leaders retire legacy applications, reduce capital and operating expenses, and meet governance and compliance requirements. We evaluate vendors offering products and services that provide archiving for databases and data from enterprise applications. Read the complete article at: Magic Quadrant for Structured Data Archiving and Application Retirement


Information Governance: Busting Three Big Myths

Information Governance: Busting Three Big Myths

Information governance is increasingly recognized as vital to an organization’s ability to realize value from its information in a way that addresses legal, operational, and other forms of risk.


Training Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

Training Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


File Analysis Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

File Analysis Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Are Endpoints the Axis of Evil or the Catalyst of Creation?

Are Endpoints the Axis of Evil or the Catalyst of Creation?

You need prevention to defend against low-focus attacks and to make targeted attacks harder. You need detection to spot the attackers who inevitably get through. And you need response to minimize the damage, restore security and manage the fallout.


LDiscovery Announces Acquisition of Credence Corporation

LDiscovery Announces Acquisition of Credence Corporation

LDiscovery, LLC, a leading provider of eDiscovery services and Information Governance solutions, today announced its acquisition of Credence Corporation, a Fort Lauderdale based eDiscovery and managed services provider.


Court Drops e-Discovery Sanctions Hammer in Delta Air Lines Case

Court Drops e-Discovery Sanctions Hammer in Delta Air Lines Case

In the ongoing civil litigation In Re Delta/AirTran Baggage Fee Litigation, five years and at least four major e-discovery failures have now cost the defendants millions of dollars in fines and penalties.