News & Analysis as of

Passwords e-Discovery Data Protection

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Foley & Lardner LLP

BYOD to E-Discovery: What Happens When Employees “Scan” and Send Chats of Company Documents Using Their Phones?

Foley & Lardner LLP on

We recently cautioned employers about their confidential information showing up in selfies posted online, but social media is not the only reason employees are taking photos at work. Picture this: An employee quickly...more

Array

How to Make Your eDiscovery Process More Secure

Array on

For those engaged in eDiscovery, protecting companies’ sensitive data is only increasing in importance. Each year, the odds that a company or its law firm will experience a data breach grow. According to the Identity...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide