Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
eDiscovery Needs Digital Forensics for a Mobile World
What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Hot Trends in Federal Enforcement on the Web in 2013 from Ifrah Law Partners
The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
If your organization embraces (or simply allows!) the use of mobile devices for the workplace, the natural tradeoff you’re making for increased productivity, efficiency and convenience is an increase in cybersecurity risks to...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more
All enterprises are struggling with the security risks posed by the use of mobile devices by employees. Companies want their employees to have easy access to information so that they can perform their job functions in an...more
In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more
It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more
The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more
A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more
So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more