Just under 94% (93.3%) of eDiscovery Business Confidence Survey respondents feel the current business conditions are good or normal in the spring of 2019. This combined confidence level represents a solid increase in these same feelings when compared to the winter of 2019 where 89.3% felt the conditions were good or normal. However, respondents rating the current business conditions as good dropped to 41.1%, the lowest rating in this area since the inception of the survey. This drop appears to represent a solid, yet slowly diminishing optimism in the current general business climate for eDiscovery.
The role of the Chief Information Security Officer (CISO) is becoming the norm in eDiscovery companies as these companies grow their client base and venture into compliance and data breach prevention services. In fact, one industry expert sees the CISO role also being weaponized to support the sales function during client discussions about security.
While not a new concept, counter-marketing with social media does provide companies a unique way to increase awareness and demand while at the same time attempting to neutralize the impact of competitor social media marketing. The aim of social media counter-marketing is not to disparage competitors or detract from their social media efforts, but to translate their work into another opportunity to bring awareness to your company, message, and offerings.
Pivotal Acquisition Corp., a public investment vehicle, and KLDiscovery, a global provider of electronic discovery and information governance services to Fortune 500 companies and top law firms, announced on May 20, 2019, that they have entered into a definitive agreement in which KLD and Pivotal will merge. As a result of the transaction, valued at approximately $800 million in enterprise value, KLD will become a publicly listed company.
The main opportunity to push for greater innovation and to draw on specialist capabilities obviously comes at contract time, and there is good news here. To keep up with rapidly changing technology requirements, corporate buyers have been trimming the sourcing cycle. The average contract length for IT and BPO deals shrunk from 4.8 years in 2007 to 4.3 years in 2017, according to IDC, and we expect it will settle at slightly more than 4 years.
A new group of Intel vulnerabilities, collectively called Microarchitecture Data Sampling (MDS), were disclosed last week. The vulnerabilities allow attackers to steal data as processes run on most machines using Intel chips. The vulnerabilities affect nearly every Intel processor released in the past decade and may be especially dangerous in multi-user environments like virtualized servers in data centers.
A selection of five articles shared regularly to inform and update legal and information technology professionals on the art and science of data discovery and legal discovery.
A Net Promoter Score®, commonly referred to as NPS®, is a straightforward metric that measures customer experience and appears to be a predictor of company growth. Based on the importance of customer experience for eDiscovery businesses and the increasing investor activity in the data and legal discovery ecosystem, it appears to be a number of increasing interest to both organizational leaders and industry investors.
According to the IT Dashboard, federal agencies expect to invest a combined $1.6 billion in cloud infrastructure as a service (IaaS) and platform as a service (PaaS), $924 million in cloud software as a service (SaaS), and $9.9 billion in other managed services. The true figures are likely 15-20 percent higher, as $19 billion in national security-related IT projects are not reported to the dashboard.
The BSA Framework for Secure Software tackles complex security challenges through an adaptable and outcome-focused approach that is risk-based, cost-effective, and repeatable. The Framework describes baseline security outcomes across the software development process, the software lifecycle management process, and the security capabilities of the software itself.
The work that Thomas Peyrin and his colleague, Gaetan Leurent, have done goes far beyond just proving SHA-1 chosen-prefix collision attacks are theoretically possible. They show that such attacks are now cheap and in the budget of cybercrime and nation-state attackers.