Posts Tagged ‘security’

5 Experts Share Advice on Preparing for GDPR

5 Experts Share Advice on Preparing for GDPR

The General Data Protection Regulation (GDPR) is a great example of change taking place in one part of the world — the European Union — that will have global impact.


IT Security vs. Cloud Creep – The Menace that Comes from Within

IT Security vs. Cloud Creep - The Menace that Comes from Within

It is fundamental that a company’s IT department looks to create an efficient and precise framework for all cloud purchasing. It should be expected that each department will insist on having a say as to which cloud applications they prefer to use, therefore IT teams should strive to advise each sector accordingly.


Top 10 Steps to Operationalize the GDPR

Top 10 Steps to Operationalize the GDPR

Being GDPR ready is a task which extends beyond the privacy or compliance team and requires the involvement and cooperation of the entire organization to take compliance with the GDPR from theory to practice. 


How a Remote Browser Increases Security and Helps IT Stay on Budget

How a Remote Browser Increases Security and Helps IT Stay on Budget

Reduced complexity, increased security, and perfect insulation — those are the outcomes reported by organizations who deployed a remote browser to protect their users when they access the web.


The Role of Encryption in Law Firm Data Security

The Role of Encryption in Law Firm Data Security

The use of encryption boils down to a discussion of acceptable risk. The appropriate level of encryption depends upon specific use cases and is a balance among many factors, including the sensitivity of the data, the need for usability and convenience in accessing and using the data, and the impact if the data were to be breached.


Edge Computing Could Push the Cloud to the Fringe

Edge Computing Could Push the Cloud to the Fringe

Peter Levine, a general partner at venture capital firm Andreessen Horowitz, has an interesting working theory. He believes that cloud computing is soon going to take a back seat to edge computing — and we will very quickly see the majority of processing taking place at the device level.


Key Considerations for Adopting Ephemeral Communications Tools

Key Considerations for Adopting Ephemeral Communications Tools

As with the adoption of any emerging technology in the workplace (email, electronic signatures, etc.), the use of ephemeral communication tools by an organization requires a risk-versus-reward analysis. 


This PIG – Predictive Information Governance – Is Starting to Fly

This PIG – Predictive Information Governance – Is Starting to Fly

As the name implies, unsupervised machine learning – computers teaching themselves – removes the human factor. And once the error rates are low enough, truly automated predictive information governance is realized. The system can now automatically collect, categorize, store, protect, safeguard access, and apply retention/disposal rules.


Merger and Acquisition Due Diligence: Incorporating Privacy, Security, eDiscovery, and Information Governance into Due Diligence

Merger and Acquisition Due Diligence: Incorporating Privacy, Security, eDiscovery, and Information Governance into Due Diligence

Modern M&A practices are just now beginning to catch-up to new technologies by including data privacy (“DP”), information security (“IS”), e-Discovery, and information governance (“IG”) concerns as discrete issues within the traditional due diligence paradigm.


NCT Ventures and Bridge Investments Join JumpStart in $1.8M Fundraising Round for Heureka Software

NCT Ventures and Bridge Investments Join JumpStart in $1.8M Fundraising Round for Heureka Software

Today, Heureka Software announced the company has added new funding from Columbus-based NCT Ventures and Chicago’s Bridge Investments. Combined with previous funding from Cleveland Venture Development Organization JumpStart Inc. and other angels, this increases Heureka’s current fundraising round to $1.8 million.


OpenText to Acquire Guidance Software

OpenText to Acquire Guidance Software

OpenText™ (NASDAQ: OTEX) (TSX: OTEX), a global leader in Enterprise Information Management (EIM), announced today that it has entered into a definitive agreement to acquire Guidance Software (NASDAQ: GUID), the makers of EnCase®, the gold standard in forensic security, that includes digital discovery solutions and endpoint information security.


BayLDA Publishes Questionnaire Regarding GDPR Audit

BayLDA Publishes Questionnaire Regarding GDPR Audit

The BayLDA is responsible for data protection for the private sector in Bavaria and is supervising data processing by privately owned corporations/commercial entities, freelancers, privately owned hospitals and nursing homes, associations and political parties, online companies, and private individuals. On the basis of numerous requests, the BayLDA decided to publish its recent questionnaire regarding the GDPR audit in English.


German Parliament Enacts Wide-ranging Surveillance Powers Allowing End User Devices to Be Hacked by Authorities

German Parliament Enacts Wide-ranging Surveillance Powers Allowing End User Devices to Be Hacked by Authorities

On June 22, 2017, the German Parliament passed a bill that, among other things, awards extensive surveillance powers to law enforcement authorities.


Is Revenue Raining Out of Your Cloud?

Is Revenue Raining Out of Your Cloud?

Traditional technology hardware and software companies are seeing a significant share of their growth from the cloud. With legacy revenue streams declining – and in some cases declining rapidly – it is imperative that companies make the transition to cloud effectively. This is no simple task.


No Searching of Cloud Data at the Border

No Searching of Cloud Data at the Border

U.S. border officers aren’t allowed to look at any data stored only in the “cloud” — including social media data — when they search U.S. travelers’ phones.


Tallinn Manual 2.0: The Rulebook for Cyberwar

Tallinn Manual 2.0: The Rulebook for Cyberwar

The Tallinn Manual 2.0 is a unique collection of law on cyber-conflict, says Professor Michael Schmitt from the UK’s University of Exeter, who led work on the tome.


Data Loss Threatens M&A Deals

Data Loss Threatens M&A Deals

More than half of all enterprise data now lives on endpoints, beyond traditional visibility and security tools centered on a network drive or central server. If the target company can’t see what its employees are doing with data on their laptops and desktops, then a potential buyer has near zero visibility.


A Little Privacy is Better Than None: Considering Private and Public Cloud Computing

A Little Privacy is Better Than None: Considering Private and Public Cloud Computing

Extracts from two informational papers highlighting key differences between private and public cloud infrastructures and why those differences may be important for the security of critical data and applications.


The New Information Governance Playbook for Addressing Digital Age Threats

The New Information Governance Playbook for Addressing Digital Age Threats

Published in the Richmond Journal of Law & Technology, The New Information Governance Playbook for Addressing Digital Age Threats by Philip Favro, Donald Billings, David Horrigan, and Adam Kuhn provides actionable information for assessing and addressing cyber threats.


Deeper Dive: Vendor Management Crucial for Data Protection

Deeper Dive: Vendor Management Crucial for Data Protection

Organizational obligations regarding data privacy and security extend not only to the data in a company’s possession, but also to its data in the possession of a third-party service provider or business partner.


What Is Auto-Classification and How Does It Assist with GDPR Compliance?

What Is Auto-Classification and How Does It Assist with GDPR Compliance?

Auto-Classification’s ability to group information by category or by specific characteristics will prove useful for GDPR compliance. Similarly, Auto-Classification’s ability to detect the presence of PII and other sensitive content will likely become a best practice when it comes establishing GDPR protections.


Cybersecurity a Pain Point for Plaintiffs

Cybersecurity a Pain Point for Plaintiffs

Enhanced cybersecurity is a rising tide that floats all boats. But, let me reveal who’s likely to get swamped by this rising tide: requesting parties (or, as corporations call them “plaintiffs’ lawyers”), and their experts and litigation support providers.


eDiscovery: Asia Pacific To Top North America In Growth Rate Due To Robust Industrialization

eDiscovery: Asia Pacific To Top North America In Growth Rate Due To Robust Industrialization

From a geographical standpoint, North America accounts for a dominant share in the global eDiscovery service. In the next couple of years, the region will likely pare some of its share on account of Asia Pacific overtaking it in terms of growth rate.


Five Steps to Take in the Aftermath of a Breach

Five Steps to Take in the Aftermath of a Breach

To help minimize damage, organizations should be ready to take these five steps in the aftermath of a breach.