U.S. Leadership in AI: A Plan from NIST
“The federal government can help the U.S. maintain its leadership in AI by working closely with our experts in industry and academia, investing in research, and engaging with the international…
Featured posts on the ComplexDiscovery blog designed to provide information and insight on cybersecurity areas of interest for data and legal discovery professionals.
“The federal government can help the U.S. maintain its leadership in AI by working closely with our experts in industry and academia, investing in research, and engaging with the international…
The recently published research paper "Estimating the Success of Re-identifications in Incomplete Datasets Using Generative Models" shows how the likelihood of a specific individual to have been correctly re-identified can…
"As technology seeps into practically every aspect of our daily lives, it is increasingly critical that we do everything we can to ensure the information that companies are trusted with…
As AI gains strategic importance, it is essential to shape global rules for its development and use. In promoting the development and uptake of AI, the European Commission has opted…
Want to understand the most valuable tech stats and trends? Legendary venture capitalist Mary Meeker has just released the 2019 version of her famous Internet Trends report. This year it…
It is challenging for existing digital evidence recording and storage technologies to outperform blockchain’s robust and secure offering. With this in mind, the Digital Forensics and Incident Response (DFIR) community…
Brave is an open-source, privacy-centered browser designed to block trackers and malware. It leverages blockchain technology to anonymously track user attention securely and rewards publishers accordingly. And it may change…
The role of the Chief Information Security Officer (CISO) is becoming the norm in eDiscovery companies as these companies grow their client base and venture into compliance and data breach…
A new group of Intel vulnerabilities, collectively called Microarchitecture Data Sampling (MDS), were disclosed last week. The vulnerabilities allow attackers to steal data as processes run on most machines using…
The BSA Framework for Secure Software tackles complex security challenges through an adaptable and outcome-focused approach that is risk-based, cost-effective, and repeatable. The Framework describes baseline security outcomes across the…