News & Analysis as of

Information Governance Email

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

EDRM - Electronic Discovery Reference Model

ESI Protocol Dispute – “Modern Attachments” and the “Humpty Dumpty Issue”

In Re: Uber Technologies, Inc., Passenger Sexual Assault Litigation, 2024 WL 1772832 (N.D. Cal. Apr. 23, 2024), resolved a dispute over so-called “modern attachments” based on impressive and comprehensive technical...more

Epiq

Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind

Epiq on

“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more

Cornerstone Research

5 Questions with Mike DeCesaris: Extracting Meaningful Insights from Unstructured Data

Cornerstone Research on

5 Questions is a periodic feature produced by Cornerstone Research, which asks our professionals, senior advisors, or affiliated experts to answer five questions. We interview Mike DeCesaris, vice president of Cornerstone...more

Array

An Attachment By Any Other Name? What You Should Know About Hyperlinks in eDiscovery

Array on

An attachment is a meaty part of any email, right? Well, maybe. With companies heading in droves toward tools that store files online, the lines have gotten fuzzy. Online storage means that, instead of attaching...more

EDRM - Electronic Discovery Reference Model

May’s Notable Cases and Events in E-Discovery

[Editor’s Note: This article was first published May 17, 2023 and EDRM is grateful to Robert Keeling, Chair of the EDRM Global Advisory Council and our Trusted Partner, Sidley, for permission to republish.] This Sidley Update...more

EDRM - Electronic Discovery Reference Model

What Hath Noom Wrought?

The “modern attachments” decision of Nichols v. Noom, Inc., 2021 WL 948646 (S.D.N.Y. Mar. 11, 2021), generated a lot of buzz when it was issued. At its core, Noom held that hyperlinked files are generally not part of a...more

Orrick, Herrington & Sutcliffe LLP

Five Document Management Steps to Protect an Emerging Company’s Future

Focused on getting their businesses in a position to thrive, few emerging companies think about how documents and document management policies can cause significant future litigation exposure. We have found that emails, IMs,...more

Hanzo

How I Learned to Stop Worrying and Love Slack: A Conversion Story

Hanzo on

When I first came across the collaboration platform Slack at my former company, I was, to put it mildly, not a fan. But I’m glad to say I gave it a try, and now I am a convert to the power of collaboration applications. ...more

Wilson Sonsini Goodrich & Rosati

The SEC Issues Warnings to Companies to Review Controls to Prevent Wire Fraud Hacking Attempts

In an October 16, 2018 investigation report, the Securities and Exchange Commission found that nine companies that suffered Business Email Compromise, or BEC, had insufficient internal controls to prevent such attacks....more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide