Account

Sign in to access your account and subscription

Cybersecurity

  • In today's political climate, it has almost become "normal" that people frivolously make speculative statements without any proof that the statement is true. While this may be standard practice in the political world, in court this practice will not be convincing to any judge, especially when making an argument for e-discovery sanctions based on new rule FRCP 37(e).

    December 01, 2017Mike Hamilton
  • In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident.

    December 01, 2017Kiran Raj and Mallory Jensen
  • Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. Here's what you need to know.

    December 01, 2017Mark Sangster
  • Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.

    November 02, 2017Jason Thomas
  • This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.

    November 02, 2017Elizabeth Vandesteeg and Jeffrey Goldberg
  • New Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large

    Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.

    November 02, 2017Jared Coseglia
  • The goals of this article are: 1) to provide a basic outline of the structure of the Web and to provide some insight into the purpose for and content housed on each level; and 2) to give some practical tips on preventing your company's data from ending up on the Dark Web.

    November 02, 2017Elizabeth Vandesteeg and Jeffrey Goldberg
  • The Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age

    Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.

    November 02, 2017Zach Warren
  • As the adoption of cryptocurrencies spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations mean greater scrutiny than ever before.

    November 02, 2017Robert J. Anello and Christina Lee
  • Hidden Liability for the Unwary Lessor

    Much has been written in the industry about equipment lessors' cybersecurity practices for the protection of their information. The issue addressed herein is the equipment lessor's obligations and potential liability for information stored on equipment returned to the lessor at the end of a lease.

    November 02, 2017Michelle Schaap, Frank Peretore and Robert Hornby