Posts Tagged ‘security’

How AI Is Transforming the Workplace

How AI Is Transforming the Workplace

AI is also beginning to help managers peer into personal aspects of job performance that used to be left up to managers’ instincts and observations.


The Cloud Controls Matrix Working Group – Cloud Security Alliance®

The Cloud Controls Matrix Working Group - Cloud Security Alliance®

The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider.


The Lucrative Days of Document Review are Over

The Lucrative Days of Document Review are Over

Document review was just the beginning. In the past few years, corporate clients have shot dead another law-firm cash cow: the due diligence phase of a merger or acquisition.


From EDRM – Duke Law: Security Audit Questionnaire

From EDRM - Duke Law: Security Audit Questionnaire

The Security Audit Questionnaire from the EDRM was designed primarily to help evaluate the security capabilities of cloud providers and third parties offering electronic discovery or managed services.


10 Recommendations to Reduce Cyber Risk in the Cloud

10 Recommendations to Reduce Cyber Risk in the Cloud

When choosing a cloud service provider, it’s vital that the datacenter physically reside in a region or country in which data handling and storing legislation is favorable to your company’s business interests.


JPMorgan Software Does in Seconds What Took Lawyers 360,000 Hours

JPMorgan Software Does in Seconds What Took Lawyers 360,000 Hours

At JPMorgan Chase & Co., a learning machine is parsing financial deals that once kept legal teams busy for thousands of hours.


Are Cyber Lawyers Poised to Play Bigger Role in M&A?

Are Cyber Lawyers Poised to Play Bigger Role in M&A?

Kornbacher thinks privacy lawyers are poised to take on a bigger role in M&A deals, particularly during the due diligence phase.


The SHA1 Hash Function is Now Completely Unsafe

The SHA1 Hash Function is Now Completely Unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature. This shows that the algorithm’s use for security-sensitive functions should be discontinued as soon as possible.


Why US Companies Must Prepare for the EU’s New Data Security Laws

Why US Companies Must Prepare for the EU’s New Data Security Laws

Many US companies may not realize that they might also have to comply with this new EU data security regulation. That’s because the GDPR applies to any business that holds data about, or which markets to individuals within the EU.


Microsoft E-Mail Fight With U.S. May Be Headed to Top Court

Microsoft E-Mail Fight With U.S. May Be Headed to Top Court

The Electronic Communications Privacy Act of 1986, a law passed before the widespread use of e-mail, instant messages and Internet-based social networks, doesn’t permit courts to require U.S.-based Internet service providers to turn over customer e-mails stored on servers outside the country.


Lawyers’ Job Security in a Near Future World of AI

Lawyers’ Job Security in a Near Future World of AI

Does the inevitable triumph of AI robots over human reason and logic mean that the legal profession is doomed? Will Watson be the next generation’s lawyer of choice? Ralph Losey does not think so and shares his thoughts on this important topic.


Swiss-U.S. Privacy Shield Finalized

Swiss-U.S. Privacy Shield Finalized

On January 11, U.S. and Swiss authorities announced final agreement on the Swiss-U.S. Privacy Shield Framework. The Framework defines standards for handling personal data exported from Switzerland to the U.S. and enables U.S. companies to meet Swiss legal requirements to protect personal data transferred from Switzerland.


2016 Year-End E-Discovery Update

2016 Year-End E-Discovery Update

On the e-discovery vendor front, the pace of consolidation of large service providers in 2016 was unprecedented compared to prior years.


Public Cloud Has The Greatest Security Implications Say Execs

Public Cloud Has The Greatest Security Implications Say Execs

A new survey reveals that 65 percent of senior IT and security executives think that the biggest security risks for business come from public clouds.


Five Tips To Avoid Mistakes In Electronic Document Review

Five Tips To Avoid Mistakes In Electronic Document Review

I have seen hundreds of mistakes over the years, especially in the last decade when my work as a lawyer has been limited to electronic discovery. Many of these blunders were made by “the other side.” Some were funny and made me smile, others were not and led to motions of all kinds. Keeping it real, I have made my own fair share of errors too. Those lessons were painful, but are now deeply etched


NYDFS Proposes Revised Cybersecurity Requirements for Financial Services Companies

NYDFS Proposes Revised Cybersecurity Requirements for Financial Services Companies

The New York Department of Financial Services has released an extensively revised cybersecurity regulation applicable to the wide variety of financial services companies regulated by the NYDFS. Released on December 28, 2016, the revised regulation makes multiple changes to almost every provision in the original proposal.


Intelligence Assessment on Russian Activities and Intentions in Recent US Elections

Intelligence Assessment on Russian Activities and Intentions in Recent US Elections

The report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. It covers the motivation and scope of Moscow’s intentions regarding US elections and Moscow’s use of cyber tools and media campaigns to influence US public opinion.


Cybersecurity Best Practices: Eight Questions to Ask Your Organization

Cybersecurity Best Practices: Eight Questions to Ask Your Organization

A commitment to good cybersecurity and best practices is critical to protecting networks and systems. Here are some questions you may want to ask your organization to help prevent and mitigate against attacks.


Top Seven Cyberattack Mitigation Strategies

Top Seven Cyberattack Mitigation Strategies

The Department of Homeland Security (DHS) encourages network administrators to implement these recommendations below, which can prevent as many as 85 percent of targeted cyber-attacks.


DHS and FBI Joint Analysis Report on Russian Hacking

DHS and FBI Joint Analysis Report on Russian Hacking

Technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities.


Indictment Issued in Law Firm Hacks

Indictment Issued in Law Firm Hacks

Three Chinese citizens have been charged with hacking into the servers of two prominent – but unidentified – international law firms to steal confidential client information in connection with pending M&A deals.


A Critical Shift in Thinking About AI and Big Data

A Critical Shift in Thinking About AI and Big Data

Putting aside the dystopian views that sensationalize AI, bright prospects are ahead for corporations that embrace this transition to new ways of thinking. However, to make the leap, some radical adjustments in the ways of working are necessary.


Key Takeaways from the Newly Released GDPR Guidelines

Key Takeaways from the Newly Released GDPR Guidelines

The Article 29 Data Protection Working Party (WP29) recently held its December plenary meeting to discuss certain issues related to the implementation of the General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679), which will take effect in May 2018, and of the Privacy Shield, which was opened for self-certification by companies in August.


Protecting Financial Cyberspace

Protecting Financial Cyberspace

But as serious as these [recent] incidents are individually and collectively, none effectively illustrates the potential catastrophic consequences that cyber incidents can have when they transcend individual institutions, and affect our markets and financial systems.