The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more
4/30/2025
/ Cloud Computing ,
Cyber Attacks ,
Cyber Espionage ,
Cybersecurity ,
Data Breach ,
Email ,
Espionage ,
Extortion ,
Incident Response Plans ,
Multi-Factor Authentication ,
Phishing Scams ,
Popular ,
Ransomware ,
Risk Management ,
Supply Chain ,
Third-Party Risk
In a major development within the global artificial intelligence (AI) industry, OpenAI has lodged serious accusations against DeepSeek, a Chinese AI startup, alleging that the latter has illegally utilized its proprietary...more
2/3/2025
/ Artificial Intelligence ,
China ,
Competition ,
Cybersecurity ,
Ethics ,
Intellectual Property Protection ,
Machine Learning ,
Patent Infringement ,
Patent Litigation ,
Popular ,
Technology Sector ,
Unfair Competition
On January 27, 2025, the global tech industry experienced a seismic shift with the introduction of DeepSeek, a Chinese artificial intelligence (AI) startup that unveiled an impressive large language model (LLM). This new...more
1/28/2025
/ Artificial Intelligence ,
China ,
Competition ,
Export Controls ,
Investors ,
Machine Learning ,
Market Volatility ,
National Security ,
Popular ,
Semiconductors ,
Technology Sector
Editor’s Note: HaystackID® brought together industry experts in a recent webcast to discuss the interplay of artificial intelligence (AI), data management, and cross-functional collaboration in modern organizations. The...more
1/2/2025
/ Artificial Intelligence ,
Compliance ,
Cybersecurity ,
Data Management ,
Data Privacy ,
Data Security ,
e-Discovery Professionals ,
EDRM ,
Machine Learning ,
NIST ,
Popular
The intersection of economic indicators and Hart-Scott-Rodino (HSR) transaction trends provides a detailed view of the evolving mergers and acquisitions (M&A) environment. These insights are essential for professionals...more
12/13/2024
/ Acquisitions ,
Artificial Intelligence ,
Compliance ,
Cross-Border Transactions ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Protection ,
Department of Justice (DOJ) ,
Document Review ,
e-Discovery ,
Federal Trade Commission (FTC) ,
Hart-Scott-Rodino Act ,
Information Governance ,
Integration ,
Mergers ,
Popular ,
Regulatory Requirements ,
Risk Assessment ,
Risk Mitigation ,
Transparency
A significant wave of economic and regulatory transformation looms over the business sector as the European Union implements the Corporate Sustainability Reporting Directive (CSRD), marking a fundamental shift in corporate...more
12/6/2024
/ Cloud Computing ,
Compliance ,
Corporate Sustainability Reporting Directive (CSRD) ,
Deadlines ,
EU ,
European Commission ,
Individual Accountability ,
Infrastructure ,
Popular ,
Regulatory Agenda ,
Reporting Requirements ,
Sarbanes-Oxley ,
Shareholders ,
Sustainability ,
Technology ,
Transformativeness ,
Transparency
ComplexDiscovery Editor’s Note: Sandra Joyce’s keynote at the Tallinn Digital Summit 2024 offers a vital look into the shifting dynamics of the cyber threat landscape. As an annual gathering of leaders from the digitally...more
12/4/2024
/ Artificial Intelligence ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Deep Fake ,
Discovery ,
e-Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
Information Governance ,
Information Technology ,
Legal Project Management ,
North Korea ,
Phishing Scams ,
Popular
In a landmark move, the U.S. Department of Justice (DOJ) is poised to introduce unprecedented measures to counteract Google’s dominance in the online search sphere. Following a decisive ruling by U.S. District Judge Amit...more
11/26/2024
/ Advertising ,
Antitrust Violations ,
Competition ,
Data Collection ,
Department of Justice (DOJ) ,
Divestment ,
Google ,
Innovation ,
Monopolization ,
Popular ,
Search Engines ,
Technology Sector
A series of recent cybersecurity breaches reveals significant vulnerabilities within educational and technology institutions, underscoring the urgent need for strengthened defenses. Among the most prominent incidents is the...more
11/14/2024
/ Breach of Implied Contract ,
Class Action ,
Cloud Service Providers (CSPs) ,
Cybersecurity ,
Data Breach ,
Data Security ,
Educational Institutions ,
Hackers ,
Investigations ,
Negligence ,
Passwords ,
Personal Data ,
Popular
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
11/6/2024
/ Artificial Intelligence ,
Business E-Mail Compromise (BEC) ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
e-Discovery ,
Email ,
Employee Training ,
Extortion ,
Fines ,
Fraud ,
Fund Transfers ,
Hackers ,
Incident Response Plans ,
Information Governance ,
Machine Learning ,
Malware ,
Multi-Factor Authentication ,
Passwords ,
Phishing Scams ,
Popular ,
Ransomware ,
Reporting Requirements ,
Securities and Exchange Commission (SEC) ,
Sensitive Business Information ,
Social Engineering ,
Spoofing
ComplexDiscovery’s Editor’s Note: This article provides a detailed analysis of the July 2024 HSR transaction data and key economic indicators, emphasizing their impact on the eDiscovery sector. It explores the implications of...more
9/4/2024
/ Acquisitions ,
Department of Justice (DOJ) ,
Discovery ,
Discovery Costs ,
e-Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
Federal Trade Commission (FTC) ,
Hart-Scott-Rodino Act ,
Mergers ,
Popular ,
Risk Mitigation
With every iOS update, Apple continues to tighten its grip on user privacy. The newly introduced iOS 18 is no different, bringing a suite of privacy features that are bound to make our lives as digital forensic experts a tad...more
Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more
Major hospitals in London are grappling with severe disruptions following a cyberattack on Synnovis, a key pathology services provider. The attack has resulted in canceled surgeries and emergency patients being diverted to...more
Amidst an ever-evolving cyber threat landscape, a recent slew of regulatory updates and cybersecurity standards are defining a new battlefront for securing critical infrastructure and corporate data across varying sectors....more
5/30/2024
/ Compliance ,
Critical Infrastructure Sectors ,
Cyber Incident Reporting ,
Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Preservation ,
Data Security ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Incident Response Plans ,
New Regulations ,
Popular ,
Ransomware
As the proposed $14.9 billion acquisition of U.S. Steel by Nippon Steel garners global attention, its implications extend far beyond mere corporate gains. This merger symbolizes a strengthening of the crucial U.S.-Japan...more
5/17/2024
/ Acquisitions ,
Carbon Emissions ,
CFIUS ,
Clean Energy ,
Climate Change ,
Foreign Direct Investment ,
Infrastructure ,
Investment ,
Japan ,
Mergers ,
Popular ,
Steel Industry ,
Sustainability ,
Technology Sector
Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more
4/16/2024
/ Artificial Intelligence ,
Automation Systems ,
Chief Information Security Officer (CISO) ,
Cyber Threats ,
Cybersecurity ,
Data Security ,
Department of Homeland Security (DHS) ,
e-Discovery ,
Electronically Stored Information ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Policies and Procedures ,
Popular ,
Software
Editor's Note: This compelling piece dives into the revolutionary field of Emotion AI, heralded as the next frontier in digital innovation and the evolution of digital identities. As technology continues to intertwine more...more
ComplexDiscovery Editor’s Note: In this compelling piece, the ComplexDiscovery OÜ team delves into the revolutionary field of Emotion AI, heralded as the next frontier in digital innovation and the evolution of digital...more
Editor’s Note: There’s much conversation around how our industry should best use generative artificial intelligence (gen AI) to do our jobs. On March 19, 2024, HaystackID sponsored an EDRM virtual workshop that explored how...more
3/25/2024
/ Artificial Intelligence ,
Compliance ,
Confidential Information ,
Data Privacy ,
Data Security ,
Document Review ,
Legal Technology ,
Machine Learning ,
Natural Language Processing ,
Popular ,
Regulatory Agenda ,
Training
Editor’s Note: The Hart Scott Rodino Act (HSR Act) is a federal law that requires companies planning to merge or acquire certain assets or voting securities to notify the Federal Trade Commission (FTC) and the Department of...more
11/16/2023
/ Acquisitions ,
Annual Reports ,
Antitrust Division ,
Cybersecurity ,
Department of Justice (DOJ) ,
e-Discovery ,
Federal Trade Commission (FTC) ,
Hart-Scott-Rodino Act ,
Investment ,
Mergers ,
Popular ,
Premerger Notifications ,
Regulatory Agenda ,
Threshold Requirements
Editor’s Note: This article covers valuable insights on artificial intelligence’s (AI) evolving role in cybersecurity and incident response shared during an expert panel discussion. As cybersecurity, information governance,...more
10/25/2023
/ Artificial Intelligence ,
Audits ,
Automation Systems ,
Compliance ,
Cybersecurity ,
Data Breach ,
e-Discovery Professionals ,
Ethics ,
Incident Response Plans ,
Information Governance ,
Machine Learning ,
New Regulations ,
Oversight Duties ,
Personal Information ,
Popular ,
Privacy Laws ,
Professional Responsibility ,
Risk Assessment ,
Training ,
Transparency ,
Vetting
Editor’s Note: In this concise article, veteran legal technology executive Hal Brooks offers his insights into the transformational changes underway in the legal services sector. Speaking at the recent SOLID East conference,...more
9/13/2023
/ Artificial Intelligence ,
Compliance ,
Cyber Insurance ,
Cybersecurity ,
Data Protection ,
Inflation Reduction Act (IRA) ,
Innovation ,
Integration ,
Investment ,
Legal Technology ,
Machine Learning ,
Market Volatility ,
Military Conflict ,
Popular ,
Ukraine
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
9/6/2023
/ Artificial Intelligence ,
Compliance ,
Cyber Attacks ,
Cybersecurity ,
Data Management ,
Data Security ,
e-Discovery ,
EDRM ,
FOIA ,
Fraud ,
Information Governance ,
Information Technology ,
Investigations ,
Machine Learning ,
Policies and Procedures ,
Popular ,
Ransomware ,
Sensitive Business Information ,
Sensitive Personal Information ,
Supply Chain
[EDRM Editor’s Note: This article was first published here on June 6, 2023 and EDRM is grateful to Rob Robinson, editor and managing director of ComplexDiscovery, for permission to republish.] [ComplexDiscovery Background...more