Posts Tagged ‘security’

What CENTCOM Can Teach You About Cloud Security

What CENTCOM Can Teach You About Cloud Security

Individuals calling themselves the “CyberCaliphate” hacked into the Twitter feed for the U.S. military’s Central Command last week, and for 40 minutes posted photos, links, and videos before the account was shut down. They also gained access to Central Command’s YouTube profile, updating the banner image and posting Islamic State propaganda videos. While no confidential or top secret information was stolen, and hackers did not gain access to the U.S. Department of Defense’s network, the incident illustrates the risks government agencies face as they increasingly rely on cloud services to fulfill their mission and communicate with the outside world.


Podcast: The Government’s Dark Data: A Decade of Discovery

Podcast: The Government’s Dark Data: A Decade of Discovery

In this episode of Digital Detectives, Sharon Nelson and John Simek interview Jason Baron about information governance, dark data, open government, and his role in The Decade of Discovery. Baron talks about the increasing amount of electronic data affecting the Freedom of Information Act (FOIA) and the discussion e-discovery experts need to have about providing public access to government records.


2014 Year-End E-Discovery Update

2014 Year-End E-Discovery Update

By Gibson Dunn In our Mid-Year E-Discovery Update , we reported that 2014 was shaping up to be the “year of technology” in e-discovery. The remainder of the year more than lived up to those expectations. Powerful new data analytics tools have become available for search and review, predictive coding pricing is becoming more accessible […]


A New Model for Cloud Maturity

A New Model for Cloud Maturity

According to a recent Cloud Security Alliance survey on cloud adoption practices and trends , large companies have more mature governance practices than their smaller peers. But across the board, fewer than half of companies surveyed have implemented controls like acceptable use policies for cloud, security awareness training programs, and cloud governance committees to create policies and monitor enforcement. Today, 72% of companies don’t even know the scope of shadow IT at their companies, but the majority understand shadow IT is not going away and must be managed.


Information Governance: Not A Product, Not A Technology, Not A Market

Information Governance: Not A Product, Not A Technology, Not A Market

I’m going to add to the IG definition war this week, by describing information governance as:

“A holistic strategy for using and managing information to meet business objectives. Information governance assures the quality of content and data, maximizes its value, and ensures that security, privacy, and life-cycle requirements are met”.


Introducing “ei-Recall” – A New Gold Standard for Recall Calculations in Legal Search – Part Two

Introducing “ei-Recall” – A New Gold Standard for Recall Calculations in Legal Search – Part Two

A review some of the basic concepts and terminology used in this article may be helpful before going further. It is also important to remember that ei-Recall is a method for measuring recall, not attaining recall. There is a fundamental difference. Many of my other articles have discussed search and review methods to achieve recall, but this one does not.

Everyone should know that in legal search analysis False Negatives are documents that were falsely predicted to be irrelevant, that are in fact relevant. They are mistakes. Conversely, documents predicted irrelevant, that are in fact irrelevant, are called True Negatives. Documents predicted relevant that are in fact relevant are called True Positives. Documents predicted relevant that are in fact irrelevant are called False Positives.


Unclear on the Concept, Revisited

Unclear on the Concept, Revisited

A colleague buttonholed me at the American Bar Association’s recent TechShow and asked if I’d visit with a company selling concept search software to electronic discovery vendors. Concept searching allows electronic documents to be found based on the ideas they contain instead of particular words. A concept search for “exploding gas tank” should also flag documents that address fuel-fed fires, defective filler tubes and the Ford Pinto. An effective concept search engine “learns” from the data it analyzes and applies its own language intelligence, allowing it to, e.g., recognize misspelled words and explore synonymous keywords.


Using Spellcheck? Electromagnetic Fields Could Reveal Your Writing

Using Spellcheck? Electromagnetic Fields Could Reveal Your Writing

It has long been known that subtle electronic fields and noises emitted by computers can reveal clues about your activity, a powerful spying method that can be done from a few feet away. These so-called “side-channel signals” can be collected by antennas or microphones and through analysis could reveal sensitive data such as encryption keys.


2014 eDiscovery Case Law Year in Review, Part 1

2014 eDiscovery Case Law Year in Review, Part 1

It’s time for our annual review of eDiscovery case law! We had more than our share of sanctions granted and denied, as well as disputes over admissibility of electronically stored information (ESI), eDiscovery cost reimbursement, and production formats, even disputes regarding eDiscovery fees. So, as we did last year and the year before that and also the year before that , let’s take a look back at 2014!


A Simple Breach

A Simple Breach

A locked door is nothing to a determined intruder, and who among us is protected by more than a thin pane of glass? Our feeble efforts at security merely serve to stave off opportunistic threats of the sort that move on to easier pickings when a door is locked or the lights on. The rest is mostly luck.


2014 Information Governance Year in Review

2014 Information Governance Year in Review

2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many organizations.


The Cloud in 2015: Predictions from Greylock and Sequoia

The Cloud in 2015: Predictions from Greylock and Sequoia

By Kamal Shah It’s always fun (and a bit humbling) to look back at predictions for the current year to see which were spot on and which missed the mark. In reexamining our own predictions for 2014 , several came to fruition in full effect: “The rise of SMACS,” “Enterprises regain control of encryption keys,” […]


Are You Still Paying Hosting Charges?

Are You Still Paying Hosting Charges?

By Greg Buckles Amazon and Microsoft cloud storage and servers have driven the Total Cost of Ownership (TCO) for online data storage down into the 10-15¢/GB/month range depending on whether you need a dedicated, encrypted appliance or other special security for your sensitive data. The bottom line is that this has eDJ Group clients challenging […]


No Export License Required for Software as a Service

No Export License Required for Software as a Service

The US Department of Commerce, Bureau of Industry and Security (BIS) recently released a redacted Advisory Opinion dated November 13, 2014 that confirms for cloud-based software vendors (or Software as a Service providers) that allowing access to export controlled software for use only in the cloud (or on servers) does not constitute an export of that software to the user.


ILTA 2014 Law Firm Tech Survey – Highlights

ILTA 2014 Law Firm Tech Survey – Highlights

The ILTA 2014 Law Firm Tech Survey was just released. The International Legal Technology Association each year conducts a comprehensive survey of law firm technology. At 301 pages, the report is packed with information. I summarize here findings on practice support and the business of law that I find interesting; I also offer some comments. This survey is a Herculean effort and we should all applaud ILTA and the many volunteers and participants who make it possible.


Big Data Market Projected to Reach $76 Billion by 2020

Big Data Market Projected to Reach $76 Billion by 2020

As data continues to proliferate exponentially, businesses of all kinds are finding it more and more worthwhile to analyze that data so they can better pinpoint market opportunities, deliver greater value to their customers and improve the efficiency of their operations. But businesses need a lot of help gathering, integrating, analyzing and monetizing data on an increasingly massive scale.


More 2014 eDiscovery Survey Results

More 2014 eDiscovery Survey Results

Kroll just released conclusions and limited data from a short eDiscovery survey covering trends such as Predictive Coding (PC/TAR) use, Social Media, BYOD, the ‘Internet of Things’ and Security. With over 550 law firm and corporate respondents, Kroll has certainly managed to get a statistically significant sampling, though they were the first to acknowledge that their questions were very basic data points.


Big Data: Big Business, Big Privacy Issues

Big Data: Big Business, Big Privacy Issues

Big data is now big business. In recent years, due to the exponential growth of databases (spurred at least in part by social media and cloud storage) and of the capability of technology to undertake data analytics on a massive scale, organisations have started to appreciate the potential hidden value that could be derived from their data.


2014 eDiscovery Trends: Survey Results

2014 eDiscovery Trends: Survey Results

Kroll Ontrack surveyed over 550 law firm and corporate ediscovery professionals to gauge the biggest trends and impacts in ediscovery in 2014. This was a great year for the world of ediscovery, and now is the perfect time to share some of the interesting 2014 trends with all of you.


Docker And The Rise of Open Source

Docker And The Rise of Open Source

There’s never been a phenomenon like Docker . Eighteen months ago, the company took its core technology, which enables IT people to move software easily between different machines by enclosing it in “containers”, and made it open source.


Public Perceptions of Privacy and Security in the Post-Snowden Era

Public Perceptions of Privacy and Security in the Post-Snowden Era

While Americans’ associations with the topic of privacy are varied, the majority of adults in a new survey by the Pew Research Center feel that their privacy is being challenged along such core dimensions as the security of their personal information and their ability to retain confidentiality.


The Pendulum Swings: Practical Measurement in eDiscovery

The Pendulum Swings: Practical Measurement in eDiscovery

Until a few years ago, there was basically no effort expended to measure the efficacy of eDiscovery. As computer-assisted review and other technologies became more widespread, an interest in measurement grew, in large part to convince a skeptical audience that these technologies actually worked. Now, I fear, the pendulum has swung too far in the other direction and it seems that measurement has taken over the agenda.


Selecting an eDiscovery Vendor is Like Buying the Right Car – but Don’t Forget about the Dealership

Selecting an eDiscovery Vendor is Like Buying the Right Car – but Don’t Forget about the Dealership

In a sea of 600+ e-discovery providers in the US alone, trying to find the right vendor to meet and fulfill your requirements is difficult. Like purchasing a car, you have a choice of vendors that range from local, to regional and national providers. Some that use their own technologies, others that use off-the-shelf products and a few others that provide traditional processing and hosting services spawned from the paper world.


Hadoop, Data Lakes, Predictive Analytics and the Ultimate Demise of Information Governance – Part Two

Hadoop, Data Lakes, Predictive Analytics and the Ultimate Demise of Information Governance – Part Two

Information Governance is, or should be, all about finding the information you need, when you need it, and doing so in a cheap and efficient manner. Information needs are determined by both law and personal preferences, including business operation needs. In order to find information, you must first have it. Not only that, you must keep it until you need it. To do that, you need to preserve the information.