A Warning from the FTC: Remediate Log4j Security Vulnerability
When vulnerabilities are discovered and exploited, it risks a loss or breach of personal information, financial loss, and other irreversible harms. The duty to take reasonable steps to mitigate known…
Unlocking Choice? KLDiscovery Launches Nebula Enterprise™ Server-Rack Appliance
According to Christopher Weiler, CEO of KLDiscovery Inc., “Widespread public cloud adoption among eDiscovery software providers has effectively limited the choices available to customers who have unique geographic, security, or…
A New Financial Ecosystem? NIST Draft Report on Cybersecurity for Open Banking
This new draft report from NIST on Open Banking describes a new kind of financial ecosystem that gives third-party financial service providers open access to consumer banking, transactions, and other…
The Criticality of New Ideas: Considerations from the 2021 Global Innovation Index
According to World Intellectual Property Organization (WIPO) Director-General Daren Tang. “This year’s Global Innovation Index shows us that in spite of the massive impact of the COVID-19 pandemic on lives…
eDiscovery Mergers, Acquisitions, and Investments in Q4 2021
From Consilio and Epiq to Driven and Innovative Discovery, the following findings, data points, and tracking charts highlight information that may be useful for understanding M&A+I activity patterns in the…
DAM Ransomware! A Detection, Avoidance, and Mitigation (DAM) Framework for Ransomware
Ransomware attacks have emerged as a major cybersecurity threat wherein user data is encrypted upon system infection. Latest ransomware strands using advanced obfuscation techniques along with offline C2 Server capabilities…
Assessment and Advice: ENISA Update on Log4j Vulnerability
On December 9th, information about a critical unauthenticated Remote Code Execution (RCE) vulnerability (CVE-2021- 44228) that is affecting the well-known Java logging package Log4j used by many popular applications and…
[Legal Education Webcast] Out of the Breach and Into The Fire! Discovery Intelligence in Sensitive Data Discovery
Finding, understanding, and addressing sensitive information ranging from personally identifiable information (PII) to protected health information (PHI) and acting on the challenges and requests it drives has become a necessity…
Trusting the Process? 2021 eDiscovery Processing Task, Spend, and Cost Data Points
Based on the complexity of cybersecurity, information governance, and legal discovery, it is a continual challenge to understand the relationships, opportunities, and costs of specific eDiscovery-centric tasks. With this challenge…
From Taxonomies to Threats? Securing Machine Learning Algorithms
According to the European Union Agency for Cybersecurity (ENISA), findings from the recently published report "Securing Machine Learning Algorithms" indicate that there is no unique strategy in applying a specific…