• Features

    Using Computer Forensics to Investigate Employee Data Theft

    Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker

    When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

    Read More ›

  • Features

    State of the Industry: e-Discovery and Cybersecurity

    Jared Coseglia

    Part One of a Three-Part Article

    There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.

    Read More ›

  • Features

    Information Governance: Law Firms' Cybersecurity Weak Spot

    Ian Raine

    Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

    Read More ›

  • Features

    Survey Reflects Growth in How Corporations Manage and Protect Information

    Ari Kaplan

    Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.

    Read More ›

  • Features

    Got a Negative Online Review? First Things First: Turn Off Your Attorney

    Dan Lear

    It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.

    Read More ›

  • Features

    Legal Tech
    Making Sense of New Data Types in the App Age

    Tim Anderson and JR Jenkins

    While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

    Read More ›

  • Features

    Online Extra
    What Companies Can Demand From Law Firms on Data Security

    C. Ryan Barber

    Association of Corporate Counsel Releases First Set of Model Cybersecurity Practices

    Read More ›

  • Features

    Online Extra
    Are Law Departments Letting Law Firms Off the Hook When it Comes to Cybersecurity?

    Daniella Isaacson

    It is time for a reality check on cybersecurity. Our research has focused on the threat that data breaches present to law firms and law departments independently, but the interplay between cybersecurity at law firms and law departments is increasingly impossible to ignore.

    Read More ›


Need Help?