News & Analysis as of

Cybersecurity Discovery Today's Popular Updates

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
EDRM - Electronic Discovery Reference Model

Quantum Leap: Google Claims Its New Quantum Computer Provides Evidence That We Live in a Multiverse

In the history of technological revolutions, there are moments that challenge not only our understanding of what is possible but the very nature of reality itself. Google’s latest refinement to its quantum computer, Willow,...more

J.S. Held

Leveraging Generative AI in Complex Investigations

J.S. Held on

Complex investigations are on the rise with investigators being asked to do more with less, therefore needing to gain efficiency to handle workloads. A complex investigation can be triggered by a litigation event, government...more

EDRM - Electronic Discovery Reference Model

From Moscow to Pyongyang: Cyber Threats Revealed by Sandra Joyce at the Tallinn Digital Summit

ComplexDiscovery Editor’s Note: Sandra Joyce’s keynote at the Tallinn Digital Summit 2024 offers a vital look into the shifting dynamics of the cyber threat landscape. As an annual gathering of leaders from the digitally...more

Association of Certified E-Discovery...

Tips for Paralegals and Litigation Support Professionals – July 2024

July 6, 2024 – Rufus – How to Create Bootable Media with ISO Files If you have a flash drive or disc from which you want to access a program when booting up in BIOS, the data can be saved in an .iso file – which acts as a...more

EDRM - Electronic Discovery Reference Model

DefCon Chronicles: Sven Cattell’s AI Village, ‘Hack the Future’ Pentest and His Unique Vision of Deep Learning and Cybersecurity

DefCon’s AI Village - Sven Cattell, shown above, is the founder of a key event at DefCon 31, the AI Village. The Village attracted thousands of people eager to take part in its Hack The Future challenge. At the Village I...more

EDRM - Electronic Discovery Reference Model

DefCon Chronicles: Hackers Respond to President Biden’s Unprecedented Request to Come to DefCon to Hack the World for Fun and...

Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more

Reveal

The best data retention policy template to get you started (Updated)

Reveal on

Editor’s note: This post was originally published in October 2020 and has been updated for accuracy and comprehensiveness. They say more is better. And that’s true in many cases, but not when we’re talking about a stockpile...more

HaystackID

[Webcast Transcript] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and...

HaystackID on

Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more

HaystackID

[Webinar] Don’t Throw the Baby out with the Bathwater: Back to the Basics in AI for eDiscovery - June 28th, 12:00 pm - 1:00 pm EDT

HaystackID on

With the discussion around the impact of generative AI dominating the dialogue within the legal services industry, it is easy to buy into the hype without considering if the technology is the appropriate tool for the task. ...more

EDRM - Electronic Discovery Reference Model

Testing a Red Team’s Claim of a Successful “Injection Attack” of ChatGPT-4 Using a New ChatGPT Plugin

On May 12, 2023, Chat GPT-4 began its release to the public of two new features in GPT-4, Web Browsing and Plugins. Just a few days later, a red-team instructor, Johann Rehberger, claimed to have made a successful indirect...more

HaystackID

Navigating International Discovery Restrictions: Seven Recommendations

HaystackID on

Background Note: International discovery exercises and investigations can be a complex and challenging process for cybersecurity, information governance, and eDiscovery professionals. Navigating the different laws and...more

EDRM - Electronic Discovery Reference Model

Cyber Fundamentals: Cybersecurity as Part of Risk Management - Cyber Risk Management Chronicles, Episode II

Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more

EDRM - Electronic Discovery Reference Model

Zero Trust Networks

A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more

Epiq

How will the Metaverse Influence Business and Legal Processes?

Epiq on

The metaverse is the latest hot topic when it comes to predictions for the next iteration of the Internet. Several big tech and gaming companies are investing in this space to build it up. It should be a best practice for...more

EDRM - Electronic Discovery Reference Model

Ransomware Reduces Costa Rica to Pen and Paper

This story has been covered across cybersecurity media, but it’s so big I’m surprised it hasn’t been covered even more, by mainstream media. A ransomware attack by the Conti ransomware group has left the Costa Rican...more

Association of Certified E-Discovery...

[Webinar] Data Privacy for eDiscovery Pros: Strategy and Execution - March 17th, 1:00 pm - 2:00 pm EDT

This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more

HaystackID

[Webcast Transcript] Understanding Information Governance, Data Privacy, and Data Breach Exposure

HaystackID on

Editor’s Note: On December 1, 2021, HaystackID shared an educational webcast designed to present and describe a framework for deploying and enhancing organizational information governance programs....more

HaystackID

[Webcast Transcript] Breaches, Responses, and Challenges: Cybersecurity Essentials That Every Lawyer Should Know

HaystackID on

Editor’s Note: On September 15, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more

Association of Certified E-Discovery...

Data Protection and Cybersecurity Today

Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more

HaystackID

Wisdom From The Women Leading The Cybersecurity Industry, With Jenny Hamilton of HaystackID

HaystackID on

Editor’s Note: As part of the interview series called Wisdom From The Women Leading The Cybersecurity Industry, author, interviewer, and CEO of Data443 Risk Mitigation, Inc., Jason Remillard, recently shared the following...more

Akin Gump Strauss Hauer & Feld LLP

Update: Protecting Privilege: Top 10 Checklist for Cybersecurity Forensic Investigation Reports

In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. In contrast to an earlier...more

Oberheiden P.C.

5 Keys to Picking the Best Digital Forensics Company

Oberheiden P.C. on

From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more

Association of Certified E-Discovery...

[Webinar] E-Discovery Is Changing: Understanding the Impact of Legal GRC on E-Discovery - November 25th, 2:00 pm - 3:00 pm GMT

According to Exterro's recent 2020 Corporate Legal Leaders Report, 7-in-10 Legal Departments are now managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity...more

Association of Certified E-Discovery...

Socha’s Weekly Trend Report – August 2020 #4

Notes on recent trends in e-discovery, data privacy, and the use of technology to enhance the practice of law....more

Association of Certified E-Discovery...

Socha’s Weekly Trend Report – August 2020 #2

Notes on recent trends in e-discovery, data privacy, and the use of technology to enhance the practice of law....more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide