Uncovering Hidden Risks: Ep 12 - Cloud Security Posture Management: Top Risks and Best Practice Solutions
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: Servient – What’s Next
Sitting with the C-Suite: eDiscovery Priorities – Thoughts on the Next Five Years
Sitting with the C-Suite: Looking to the Future – Legal Tech Predictions
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more
As defined by Gartner, Shadow IT refers to IT devices, software and services outside the ownership or control of information technology (IT) organizations. These are any IT projects that are managed outside of – and...more
As more organizations find themselves under scrutiny for the way they collect and use consumer data, maintaining CCPA compliance has never been more important. CCPA has been introduced to give control back to consumers,...more
Dating sites continue to be the source of compromise of sensitive personal information. Another example of this was discovered recently by security researchers at WizCase, who found that information on millions of users of up...more