Posts Tagged ‘security’

CIO Explainer: What Is Blockchain?

CIO Explainer: What Is Blockchain?

Known by many as the technology underpinning the bitcoin digital currency, blockchain has acquired a new identity in the enterprise.


This Is Your Company on Blockchain

This Is Your Company on Blockchain

True believers say blockchain could reduce the need for businesses to organize as companies, which get work done via command and control. Using blockchain, they say, collaborators will be able to work together as free agents instead of under a hierarchy of bosses.


Identifying the Best Cloud Practices for Your Organization

Identifying the Best Cloud Practices for Your Organization

The legal practitioners’ security debate focuses on whether the legal world should be using cloud or cloud-like offerings during the course of their practice—whether that practice is as part of an in-house legal team or with a firm.


Ponemon Study Points to Risks of Visual Hacking, or ‘Shoulder Surfing’

Ponemon Study Points to Risks of Visual Hacking, or 'Shoulder Surfing'

Whether you call it ‘shoulder surfing,’ or just plain eavesdropping, new research from 3M and the Ponemon Institute outlines the risks of visual hacking.


Encryption Basics: How It Works & Why You Need It

Encryption Basics: How It Works & Why You Need It

If you’ve been putting off adopting encryption as a part of your security policy, delay no more. Here’s a guide to the science of encryption, and how you can begin implementing an encryption strategy today.


EDRM Announces Security Audit Project

EDRM Announces Security Audit Project

EDRM, the leading standards organization for the e-discovery market, announced today the establishment of a new project to develop and provide a security survey.


Visibility is a Trap: Panopticism, E-Discovery, and the Rich Kids of Instagram

Visibility is a Trap: Panopticism, E-Discovery, and the Rich Kids of Instagram

More and more, social media is being used as evidence against the wealthy in cases of fraud, according to a recent article in The Telegraph, which states that, according to leading cybersecurity firms, “social media posts are used as evidence in around 75 per cent of all litigation cases.”


Ponemon: Cloud Adoption Grows as Security Lags

Ponemon: Cloud Adoption Grows as Security Lags

Cloud adoption is growing, but companies aren’t taking security into account the way they should. A fresh Ponemon Institute survey shows that many businesses simply aren’t adopting appropriate governance and security measures to protect sensitive data in the cloud.


Epiq Systems Reaches Agreement to be Acquired

Epiq Systems Reaches Agreement to be Acquired

Epiq will become a privately-held company and will be combined with DTI, a leading global legal process outsourcing (LPO) company majority-owned by OMERS and managed by OMERS Private Equity.


Is Encryption the Key to Your Data Security?

Is Encryption the Key to Your Data Security?

Large and small businesses are looking to additional forms of security to protect themselves and their customers from unauthorized access.


Should Companies Risk Going on the Cyber Offensive?

Should Companies Risk Going on the Cyber Offensive?

Corporate executives are fed up with the current approach to network security. They’ve been spending more and more on security. Despite that spending, they’re told that they can’t expect to keep intruders out of their networks; the best they can hope for is to lock the intruders out of their most important files, or to keep hackers from exfiltrating all that data.


Solo/Small Firm Survey: How Lawyers Spend Their Time and the Money They Make

Solo/Small Firm Survey: How Lawyers Spend Their Time and the Money They Make

One of the most striking findings of the survey (which covered firms of less than 30 attorneys) is how they spend their time.


Privacy Shield Receives Final Approval from European Commission—Some Initial Practical Advice

Privacy Shield Receives Final Approval from European Commission—Some Initial Practical Advice

Companies that participate in Privacy Shield will be able to offer to their EU business partners and affiliates a means to lawfully transfer personal data to the United States.


How to Prepare for Theft of Company Information

How to Prepare for Theft of Company Information

For companies that depend on confidential information to provide them a competitive edge, there are several proactive steps they should take to ensure their use and the full benefits of this statute if their trade secrets are stolen.


Privacy Shield Agreement Goes Into Effect in Europe and the US

Privacy Shield Agreement Goes Into Effect in Europe and the US

The European Commission has formally adopted a new agreement governing the transfer of data between Europe and the United States, more than eight months after the longstanding “Safe Harbor” transfer deal was invalidated amid concerns over US surveillance.


Cloud and Mobile Synergy: The Impact on Automation

Cloud and Mobile Synergy: The Impact on Automation

While security remains a concern for cloud computing, a study from the Cloud Security Alliance found that 65 percent of security officers and IT managers think the cloud is at least as secure as on-premise software. Getting beyond the security concern represents an important tipping point, but the cloud is really about scalable and flexible back-end processes.


New Rules: Confidentiality and Data Security in The Digital Age

New Rules: Confidentiality and Data Security in The Digital Age

If client information is now contained in data, then breaches of data security are reasonably considered to be violations of confidentiality and the attorney-client privilege as well.


Accessing Your Former Company’s Data with a Shared Password Could Make You a Hacker

Accessing Your Former Company’s Data with a Shared Password Could Make You a Hacker

If you leave your company and then use a former co-worker’s credentials to access your former company’s computer systems, you could be a hacker.


Another Challenge for Information Governance: The Defense of Trade Secrets Act

Another Challenge for Information Governance: The Defense of Trade Secrets Act

Good information governance requires not only protecting the security of sensitive and proprietary information; it often requires pursuing legal action against those who threaten the secrecy and value of a company’s trade secrets.


Privacy Shield in Limbo

Privacy Shield in Limbo

Trans-Atlantic data transfer did not end abruptly when Safe Harbor was invalidated. U.S. and EU trading partners continue to do business and will do so with or without Privacy Shield, and forward-looking companies would do well to recognize that data security is a challenge that will grow more difficult no matter what trade agreements are in place.


Brexit Means Opportunity for Legal Industry – In the Short Run

Brexit Means Opportunity for Legal Industry - In the Short Run

Litigation and e-discovery expert Chris Dale believes Brexit will likely be a boon to e-discovery consultants and attorneys – at least for a while. “In the short run, turmoil will likely be positive. Regulatory details, mergers and acquisition, cross-border disputes, transactional work, and all kinds of legal work will be in high demand as there will be massive legislative efforts to untangle the current legal framework,”


The Saga Continues… From Data Creation to Data Consumption to Data Exposure

The Saga Continues… From Data Creation to Data Consumption to Data Exposure

Despite the many potential benefits of big data analytics, the unrestrained creation and retention of data has the potential to bury organizations under a mountain of legal, regulatory and operational challenges.


With a Simple Mask, Your Data Becomes the Governance Superhero

With a Simple Mask, Your Data Becomes the Governance Superhero

A major divide exists within many organizations between the governance, automation and scalability needed by IT and the ease of use and flexibility business users demand – and it can no longer be ignored. But what’s to be done?


The Paper Trail: The Potential Data-Breach Sitting in your Printer

The Paper Trail: The Potential Data-Breach Sitting in your Printer

The continuing role of paper records in office life is a stark reminder that data security is not limited only to electronic records.