Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
2024 Privacy Trends and Their Impact on Auto Finance – Moving the Metal: The Auto Finance Podcast
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
Podcast - Decoding the Future of AI Regulation and Frontier Models
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
No Password Required: Founder of Cybersafe Foundation and an Obama Foundation Africa Leaders Fellow, Who Is Comfortable in the API Kitchen
The use of AI in banking was a topic in April, as Bank of America revealed it will spend $4 billion on AI initiatives in the coming year. The bank cited AI’s usefulness in reducing IT support calls and the over 90% usage...more
Legalweek 2025 Session Recap - The widespread interest in AI for users’ personal and professional lives has driven significant demand for tools like Copilot for Microsoft 365. However, the implementation of any AI tool...more
A Microsoft blog post reported that incident response researchers uncovered a remote access trojan in November 2024 (dubbed StilachiRAT) that “demonstrates sophisticated techniques to evade detection, persist in the target...more
Successful Microsoft Purview deployments require more than just technical implementation—they demand strategic planning, cross-functional collaboration, and ongoing optimization. Read about the key steps required to...more
Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more
In today's digital landscape, robust password management is critical to information security. With the increasing complexity of cyber threats, ensuring secure access to sensitive information has become more critical than...more
Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more
Watching the Olympics has been a thrilling ride, with jaw-dropping athletic feats and heartwarming displays of sportsmanship. But amidst this celebration of human excellence, the barrage of AI ads has been a mixed bag. While...more
It is being reported that Black Basta (aptly named) exploited a Microsoft zero-day prior to Microsoft’s release of a patch for the vulnerability back in March....more
Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more
In today's digital landscape, businesses face a choice when implementing RightAngle, do they use their existing on-prem servers and infrastructure, or do they create a new infrastructure and provision servers for the...more
Enterprise adoption of new technology has always impacted legal and eDiscovery teams. Microsoft Copilot for Microsoft 365, Microsoft’s flagship generative AI tool, is no different. While it promises to increase workplace...more
A vulnerability in Microsoft SharePoint has been flagged as being actively exploited by CISA. A vulnerability in Microsoft SharePoint is being actively exploited according to CISA’s known exploited vulnerabilities (KEV)...more
On December 20, the Federal Trade Commission (FTC or “the Commission”) published a notice of proposed rulemaking (NPRM) proposing amendments to the Children’s Online Privacy Protection Rule (the “COPPA Rule” or the “Rule”)....more
On September 26, 2023, Windows released a configuration update on Windows 11 version 22H2 (all editions) that is worth reading and applying, particularly if you use Windows Copilot....more
Welcome to the third edition of our AI Legal News Summer Roundup! After five class actions were filed between June 28 and July 11 (as reported on in our first edition of this series), on July 21, another class action lawsuit...more
Like it or not, the remote workforce is here to stay. Statistics show that employees say they are more productive working from home, and even before the global pandemic, there had been a 44% growth in the remote workforce...more
On March 22, 2023, the Federal Trade Commission (FTC) announced a request for information (RFI) seeking public comments on business practices in the cloud computing industry. The RFI focuses on three intertwined aspects of...more
Editor’s Note: On October 19, 2022, HaystackID shared an educational webcast on the potential impact of Apple’s iOS 16 release on the area of eDiscovery. With iOS 16, new chat manipulation and security features have gone...more
Prestige Ransomware Emerges, Targets Ukraine and Poland - A new ransomware variant has emerged in the wild, being used in targeted attacks against the logistics and transportation sectors within Ukraine and Poland. The...more
Microsoft recently issued mitigation steps for vulnerabilities that are being actively exploited by threat actors. Microsoft stated that it is aware that two vulnerabilities are being actively exploited to access users’...more
What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more
CYBERSECURITY - Microsoft Issues Emergency Software Update for PrintNightmare Zero Day Vulnerability - Following the release of a U.S. Cybersecurity & Infrastructure Security Agency (US-CERT) Coordination Center...more
CYBERSECURTY - U.S. CISA + Cyber Command Warns of Critical Flaw in VMware - Although a patch has been available by VMware since May 25, 2021, the Department of Homeland Security’s Cybersecurity and Infrastructure...more