News & Analysis as of

Cyber Crimes Discovery

EDRM - Electronic Discovery Reference Model

From Sextortion to Financial Scams: The Expanding Reach of Deepfakes

ComplexDiscovery’s Editor’s Note: Deepfake technology represents one of the most pressing challenges for cybersecurity and governance professionals today....more

EDRM - Electronic Discovery Reference Model

Zero Trust Networks

A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more

EDRM - Electronic Discovery Reference Model

What the Heck is Going on with Legal Industry Data Breaches

With Memorial Day weekend behind us, many people are celebrating the unofficial start of summer. And summer is almost always a blessing—nicer weather, beach vacations, shorter Fridays (if you’re lucky)—you’ve got to think...more

Epiq

The Ins and Outs of Early Case Assessment for a Cyber Incident Review

Epiq on

In the fast-moving industry of cyber incident response, success and efficiency come from preparation. Once a matter is promoted to review, the most common request for timing is “as soon as possible.” How is a client’s desire...more

HaystackID

Wisdom From The Women Leading The Cybersecurity Industry, With Jenny Hamilton of HaystackID

HaystackID on

Editor’s Note: As part of the interview series called Wisdom From The Women Leading The Cybersecurity Industry, author, interviewer, and CEO of Data443 Risk Mitigation, Inc., Jason Remillard, recently shared the following...more

Patterson Belknap Webb & Tyler LLP

Second Circuit Reaches for Affirmance in Child Pornography Case

In United States v. Clarke, the Second Circuit ventured once more into the thicket of internet crime, tangling with statutory interpretation and discovery issues complicated by their technological setting. The panel (Walker,...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide