Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
To Unlock AI’s Power, Think Predictive to Generative
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Calculating eDiscovery Costs: Tips from Brett Burney
eDiscovery for the Rest of Us: Why Small Firm eDiscovery Matters
Managing Large Scale Review Efficiency: Tips From a GC
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Using Technology in the Courtroom
The Great Link Debate and the Future of Cloud Collaboration
Why Your eDiscovery Program and Technology Need Scalability
#CaseoftheWeek with Kelly Twigger: Latin Markets Brazil, LLC v. McArdle
Podcast - Inteligencia Artificial
Systems And The Emergence Of AI In Law Practice | Ernie Svenson | Texas Appellate Law Podcast
What Does Artificial Intelligence Mean for Ediscovery Jobs? | Eye on ESI: A.I. Edition
Review Analytics for a New Era
July 6, 2024 – Rufus – How to Create Bootable Media with ISO Files If you have a flash drive or disc from which you want to access a program when booting up in BIOS, the data can be saved in an .iso file – which acts as a...more
Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more
DefCon’s AI Village - Sven Cattell, shown above, is the founder of a key event at DefCon 31, the AI Village. The Village attracted thousands of people eager to take part in its Hack The Future challenge. At the Village I...more
Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more
With the discussion around the impact of generative AI dominating the dialogue within the legal services industry, it is easy to buy into the hype without considering if the technology is the appropriate tool for the task. ...more
On May 12, 2023, Chat GPT-4 began its release to the public of two new features in GPT-4, Web Browsing and Plugins. Just a few days later, a red-team instructor, Johann Rehberger, claimed to have made a successful indirect...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more
Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more
A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more
This story has been covered across cybersecurity media, but it’s so big I’m surprised it hasn’t been covered even more, by mainstream media. A ransomware attack by the Conti ransomware group has left the Costa Rican...more
The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more
Organizations have a lot to contend with regarding their data these days. Data is more sensitive than ever, due to ever-changing data privacy laws. Yet, it’s also under siege more than ever with an increasing number of...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the...more
The Coronavirus pandemic is moving more organizations to remote working models. This enhances the potential trajectory for data security incidents and other information exfiltration to increase dramatically. The number of...more
Tomorrow is October 1st, and the end of the month is Halloween. So, the phrase “be afraid, be very afraid” (a tagline* which came from the 1986 movie The Fly) seems very appropriate for the end of October. But the phrase “be...more
Editor’s Note: On September 15, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more
Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more
Editor’s Note: On June 23, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how to consider and operationalize data mapping processes utilized in the...more
Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more
It’s hard to read the news these days without hearing about another major breach. No one is immune to these attacks including government, social media, law firms, dating websites, credit reporting agencies, and even our...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
According to Exterro's recent 2020 Corporate Legal Leaders Report, 7-in-10 Legal Departments are now managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity...more
Consilio, SecureIT360 and Polsinelli will take a deep dive into responding to a cyber-attack and data breach. Learn about what to expect when you arrive on the scene following a cyber incident, and best practices for what...more