Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.
- November 02, 2017Jason Thomas
This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
November 02, 2017Elizabeth Vandesteeg and Jeffrey GoldbergNew Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large
Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.
November 02, 2017Jared CosegliaThe goals of this article are: 1) to provide a basic outline of the structure of the Web and to provide some insight into the purpose for and content housed on each level; and 2) to give some practical tips on preventing your company's data from ending up on the Dark Web.
November 02, 2017Elizabeth Vandesteeg and Jeffrey GoldbergThe Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age
Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.
November 02, 2017Zach WarrenAs the adoption of cryptocurrencies spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations mean greater scrutiny than ever before.
November 02, 2017Robert J. Anello and Christina LeeHidden Liability for the Unwary Lessor
Much has been written in the industry about equipment lessors' cybersecurity practices for the protection of their information. The issue addressed herein is the equipment lessor's obligations and potential liability for information stored on equipment returned to the lessor at the end of a lease.
November 02, 2017Michelle Schaap, Frank Peretore and Robert HornbyFrom New Reporting Functionality to Cross-Application Tagging and Security Features, the New Updates Aim to Round Out Office 365's Information Governance and Cybersecurity Features
In a bid to appeal to legal professionals, Microsoft has updated Office 365 with information governance, security, and e-discovery capabilities, and encouraged legal technology integration with its platform.
November 02, 2017Rhys DipshanHow to Take a Law Firm Beyond Insurance
With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies.
November 02, 2017Jeff TonDo You Have Adequate Coverage?
Most traditional or "legacy" insurance products fail to provide sufficient coverage for certain risk exposures vis-à-vis the 3D printing industry, just as they fail to adequately protect businesses in other emerging industries that, along with their concomitant risks, simply did not exist when the legacy insurance products covering them were formulated.
November 02, 2017Michael S. Levine and Andrea L. DeField










