Posts Tagged ‘security’

Ponemon: Cloud Adoption Grows as Security Lags

Ponemon: Cloud Adoption Grows as Security Lags

Cloud adoption is growing, but companies aren’t taking security into account the way they should. A fresh Ponemon Institute survey shows that many businesses simply aren’t adopting appropriate governance and security measures to protect sensitive data in the cloud.


Epiq Systems Reaches Agreement to be Acquired

Epiq Systems Reaches Agreement to be Acquired

Epiq will become a privately-held company and will be combined with DTI, a leading global legal process outsourcing (LPO) company majority-owned by OMERS and managed by OMERS Private Equity.


Is Encryption the Key to Your Data Security?

Is Encryption the Key to Your Data Security?

Large and small businesses are looking to additional forms of security to protect themselves and their customers from unauthorized access.


Should Companies Risk Going on the Cyber Offensive?

Should Companies Risk Going on the Cyber Offensive?

Corporate executives are fed up with the current approach to network security. They’ve been spending more and more on security. Despite that spending, they’re told that they can’t expect to keep intruders out of their networks; the best they can hope for is to lock the intruders out of their most important files, or to keep hackers from exfiltrating all that data.


Solo/Small Firm Survey: How Lawyers Spend Their Time and the Money They Make

Solo/Small Firm Survey: How Lawyers Spend Their Time and the Money They Make

One of the most striking findings of the survey (which covered firms of less than 30 attorneys) is how they spend their time.


Privacy Shield Receives Final Approval from European Commission—Some Initial Practical Advice

Privacy Shield Receives Final Approval from European Commission—Some Initial Practical Advice

Companies that participate in Privacy Shield will be able to offer to their EU business partners and affiliates a means to lawfully transfer personal data to the United States.


How to Prepare for Theft of Company Information

How to Prepare for Theft of Company Information

For companies that depend on confidential information to provide them a competitive edge, there are several proactive steps they should take to ensure their use and the full benefits of this statute if their trade secrets are stolen.


Privacy Shield Agreement Goes Into Effect in Europe and the US

Privacy Shield Agreement Goes Into Effect in Europe and the US

The European Commission has formally adopted a new agreement governing the transfer of data between Europe and the United States, more than eight months after the longstanding “Safe Harbor” transfer deal was invalidated amid concerns over US surveillance.


Cloud and Mobile Synergy: The Impact on Automation

Cloud and Mobile Synergy: The Impact on Automation

While security remains a concern for cloud computing, a study from the Cloud Security Alliance found that 65 percent of security officers and IT managers think the cloud is at least as secure as on-premise software. Getting beyond the security concern represents an important tipping point, but the cloud is really about scalable and flexible back-end processes.


New Rules: Confidentiality and Data Security in The Digital Age

New Rules: Confidentiality and Data Security in The Digital Age

If client information is now contained in data, then breaches of data security are reasonably considered to be violations of confidentiality and the attorney-client privilege as well.


Accessing Your Former Company’s Data with a Shared Password Could Make You a Hacker

Accessing Your Former Company’s Data with a Shared Password Could Make You a Hacker

If you leave your company and then use a former co-worker’s credentials to access your former company’s computer systems, you could be a hacker.


Another Challenge for Information Governance: The Defense of Trade Secrets Act

Another Challenge for Information Governance: The Defense of Trade Secrets Act

Good information governance requires not only protecting the security of sensitive and proprietary information; it often requires pursuing legal action against those who threaten the secrecy and value of a company’s trade secrets.


Privacy Shield in Limbo

Privacy Shield in Limbo

Trans-Atlantic data transfer did not end abruptly when Safe Harbor was invalidated. U.S. and EU trading partners continue to do business and will do so with or without Privacy Shield, and forward-looking companies would do well to recognize that data security is a challenge that will grow more difficult no matter what trade agreements are in place.


Brexit Means Opportunity for Legal Industry – In the Short Run

Brexit Means Opportunity for Legal Industry - In the Short Run

Litigation and e-discovery expert Chris Dale believes Brexit will likely be a boon to e-discovery consultants and attorneys – at least for a while. “In the short run, turmoil will likely be positive. Regulatory details, mergers and acquisition, cross-border disputes, transactional work, and all kinds of legal work will be in high demand as there will be massive legislative efforts to untangle the current legal framework,”


The Saga Continues… From Data Creation to Data Consumption to Data Exposure

The Saga Continues… From Data Creation to Data Consumption to Data Exposure

Despite the many potential benefits of big data analytics, the unrestrained creation and retention of data has the potential to bury organizations under a mountain of legal, regulatory and operational challenges.


With a Simple Mask, Your Data Becomes the Governance Superhero

With a Simple Mask, Your Data Becomes the Governance Superhero

A major divide exists within many organizations between the governance, automation and scalability needed by IT and the ease of use and flexibility business users demand – and it can no longer be ignored. But what’s to be done?


The Paper Trail: The Potential Data-Breach Sitting in your Printer

The Paper Trail: The Potential Data-Breach Sitting in your Printer

The continuing role of paper records in office life is a stark reminder that data security is not limited only to electronic records.


Securing the Hybrid Cloud: What Skills Do You Need?

Securing the Hybrid Cloud: What Skills Do You Need?

Hybrid models offer many well-documented benefits, but they also introduce more complexity for securing data and applications across the enterprise. And this added complexity requires an increasingly diverse skill set for security teams.


QDiscovery Acquires Forensicon

QDiscovery Acquires Forensicon

QDiscovery, a leading provider of end-to-end eDiscovery services, has acquired Forensicon, a Chicago-based digital forensics and investigations company.


Wearables at Work: Data Privacy and Employment Law Implications

Wearables at Work: Data Privacy and Employment Law Implications

Organisations should consider whether using wearable technology to monitor their employees’ performance, health and well-being may also give rise to other legal risks or issues under workplace health and safety laws, in negligence or under a contract.


2016 Internet Trends Reports by Mary Meeker

2016 Internet Trends Reports by Mary Meeker

Kleiner Perkins Caufield & Byers partner Mary Meeker delivers her annual internet trends report. She says “easy growth is behind us” as the newest internet users are coming from less developed and less affluent countries.


Does kCura’s Cloud Software Signal a Shift in Strategy?

Does kCura’s Cloud Software Signal a Shift in Strategy?

Earlier this month, Chicago-based kCura announced it plans to release a new version of its flagship e-Discovery software, called RelativityOne.


3 Common Cloud ROI Failures You Must Avoid

3 Common Cloud ROI Failures You Must Avoid

You can actually spend more money running your workloads in the public cloud than in your own data center.


The Importance of a Proactive Information Governance Program

The Importance of a Proactive Information Governance Program

In the age of “big data”, with many organizations feeling the constant threat of security breaches and struggling to stay on top of the numerous privacy concerns, it is very important for organizations to have in place systems to effectively manage their information. Studies suggest that management of information is impacting business productivity and creating costs and liabilities for organizations.