• Features

    Effectively Managing Increasing Client Security Requirements

    Christopher Perrotta

    Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the PII to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.

    Read More ›

  • Features

    Law Firms Enter the Golden Age of Data Mining

    Doug Stansfield

    As a matter of practice, law firms generate and store incomprehensible amounts of data. Most, if not all, of that data has been digitized and many firms that recognize the untapped value of their data have begun to leverage sophisticated technologies to mine it for reusable work product and valuable insights.

    Read More ›

  • Features

    Can Artificial Intelligence Fix Security Issues?

    Nina Cunningham

    There is great enthusiasm about what AI can do to promote better living conditions, evoking wisdom, providing business intelligence through deep analysis of behavior and habits, by signaling trends and anticipating demand. But there are other considerations as well. A critical one is cybersecurity.

    Read More ›

  • Features

    How the Healthcare Industry Can Fight Rising Cyber-Attacks

    Jason G. Weiss

    The healthcare industry is facing an alarming proliferation of cyber perils. Why? Because our healthcare system is a “soft target,” and particularly vulnerable because of its lifesaving work, where time is of the essence. It’s a recipe for disaster from a cybersecurity standpoint.

    Read More ›

  • Features

    Cybersecurity Experts Needed in U.S.

    Scott R. Malyk and Lin R. Walker

    The Country Is In Dire Need of Experts Who Possess the Advanced Knowledge, Skills and Experience Required to Combat Cybersecurity Crimes

    In an effort to protect our financial, personal, medical, and otherwise confidential data, as well as our election systems, we need to continue to attract and employ the services of the most qualified cybersecurity experts from around the world. However, at present, there is a dire shortage of such qualified experts in the United States.

    Read More ›

  • Features

    Unique Cyber Risks Faced By the Cannabis Industry

    Victoria Hudgins

    All companies face cybersecurity threats, but the legalized cannabis industry’s storage of personally identifiable information and reliance on seed-to-sale tracking software can place it firmly within hackers’ crosshairs.

    Read More ›

  • Features

    Legal Tech: New Data Types Challenge E-Discovery to Keep Pace

    Cliff Dutton

    Expanding the Scope of Data Has the Potential to Slow Down Discovery and Increase Cost, But If New Data Types Contain Uniquely Dispositive Content, It Will Be Necessary to Include Them In Order to Achieve Just Determinations

    Data types evolve faster than law. New data types are expanding the scope of discoverable data. The variety, velocity and complexity of electronic evidence challenge legal processes and the technology-enabled legal applications that are designed to support them.

    Read More ›


Need Help?