Posts Tagged ‘security’

Searching For The Smoking Gun With Text Analytics

Searching For The Smoking Gun With Text Analytics

The use of computerized mathematical and linguistic methods to analyze written language is known as “text analytics.” These techniques are most often used summarize text, to identify common themes or attitudes expressed in words. Searching for surprise in text is a relatively new and active development in text analytics.


93% of Cloud Services in Healthcare Are Medium to High Risk

93% of Cloud Services in Healthcare Are Medium to High Risk

Healthcare organizations have come under fire as the targets of an increasing number of criminal hacks in the past year. The number of healthcare records exposed in the last 12 months now totals 94 million, led by blockbuster breaches at Anthem and CHS.


Big Law Firms Spending More on Technology, Experts Say

Big Law Firms Spending More on Technology, Experts Say

About half of the 281 law firms that participated in a 2014 survey by International Legal Technology Association (ILTA) and InsideLegal said they had increased their technology spending budgets that year, six percent more than the year before. More recently, legal software companies have reported an increase in business from big law firms.


Social Media as Unstructured Data? The Week’s Five Great Reads

Social Media as Unstructured Data? The Week's Five Great Reads

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


EU/Swiss-U.S. Safe Harbor: More Scrutiny by the FTC?

EU/Swiss-U.S. Safe Harbor: More Scrutiny by the FTC?

Companies that want to avoid procedural (and now substantive) scrutiny into their Safe Harbor-based personal data transfers do have other options. Fairly popular are the so-called EU Model Clauses.


Finding the ‘Big Data’ Balance

Finding the ‘Big Data’ Balance

How UK organisations can apply a data-centric approach to cybersecurity, privacy and other enterprise information challenges.


Finding Your Way with BYOA

Finding Your Way with BYOA

With the now emerging BYOA (Bring Your Own App) trend, users feel similarly empowered to build their own app solutions for business problems the same way they may employ apps at home for personal use.


Records Manager Edition: The Week’s Five Great Reads

Records Manager Edition: The Week's Five Great Reads

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


‘Go Where the Puck Will Be’: Snowden Team Leader

‘Go Where the Puck Will Be’: Snowden Team Leader

Many organisations do not know where they house their critical data, who has access to that data and what they do with the information once they have access to it.


Vendors in Educational Clothing?

Vendors in Educational Clothing?

Some for-profit providers effectively cloak their true nature and revenue source by presenting themselves as ‘organizations’, ‘associations’, ‘reference models’, ‘institutes’ or other labels intended to convey academic authority.


Worldwide eDiscovery Software Forecast, 2015–2019

Worldwide eDiscovery Software Forecast, 2015–2019

This IDC study discusses market dynamics that influenced eDiscovery software revenue in 2014 and provides insight into developments that will influence demand for the 2015–2019 period.


Marauders Map: A Facebook Messenger Tool for Stalkers

Marauders Map: A Facebook Messenger Tool for Stalkers

Naked Security carried an ominous story about a Chrome browser extension developed by Harvard College computer science student Aran Khanna which allows people to pinpoint and track the location of Facebook Messenger users.


Five Ways to Avoid Getting Sued for Discovery Malpractice

Five Ways to Avoid Getting Sued for Discovery Malpractice

Data-related fiascos that lead to malpractice suits, or disputes that would otherwise spawn malpractice claims if they weren’t settled quietly out of court, happen all the time.


Who’s Accountable? The Week’s Five Great Reads

Who's Accountable? The Week's Five Great Reads

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Gartner Launches Integrated GRC Research Program

Gartner Launches Integrated GRC Research Program

In conjunction with the start of our 2015 U.S. Security & Risk Management Summit today in Washington, DC, Gartner launched its integrated “OneGRC” research program.


Governance, Risk Management and Compliance: What is the Difference?

Governance, Risk Management and Compliance: What is the Difference?

What is the difference between Governance , Risk Management , and Compliance ?

They have become an accepted group term that describes similar and related actions and procedures by an organisation across all three of the areas.


The Buck Stops Here: CEOs Held Most Accountable by Directors for Major Data Breaches

The Buck Stops Here: CEOs Held Most Accountable by Directors for Major Data Breaches

According to a recent joint survey of nearly 200 directors of public companies by the New York Stock Exchange and Veracode, CEOs are most likely to be held responsible in the event of a major data breach, ahead of the chief information officer (CIO), chief information security officer (CISO), and board members themselves.


The Cowen Group Announces 1st Annual Critical Trends Survey

The Cowen Group Announces 1st Annual Critical Trends Survey

This survey is groundbreaking as it is the first market landscape exploring the growth of privacy, security, governance, and discovery practice groups at law firms across the US.


Embracing the Power of the Cloud in eDiscovery

Embracing the Power of the Cloud in eDiscovery

Cloud infrastructures provide an unrivalled opportunity to control eDiscovery costs without sacrificing quality, functionality, or security.


The Many Blessings Of Information Governance

The Many Blessings Of Information Governance

To manage that risk—and to maximize the value of their data—a growing number of companies are beginning to focus on information governance. Information governance is somewhat of a buzzword in the world of litigation support and e-discovery.


New Skyhigh Networks Report Reveals Growing Use of Cloud Services in Government

New Skyhigh Networks Report Reveals Growing Use of Cloud Services in Government

Skyhigh Networks , the cloud security and enablement company, today released its new “ Cloud Adoption & Risk in the Government Report .”


The Week’s Five Great Reads – New Reports Edition

The Week's Five Great Reads - New Reports Edition

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


A Fundamental Shift in Security Spending

A Fundamental Shift in Security Spending

Firms are shifting their cyber security spend away from traditional Prevent & Protect approaches towards Detect & Respond operations, according to Pierre Audoin Consultants (PAC). The new research found the shift in spending is due to a realization that cyber attacks are inevitable.


How Can You Measure Dark Social?

How Can You Measure Dark Social?

Dark social can be described as the social sharing of content outside of what web analytic programs can measure. It’s made analysts less comfortable with the ways they commonly measure like or dislike for their brand.