DISCO Acquires Legal Hold and Workflow Technology Assets
“When you look at the legal technology market, there are few companies that have enough disruptive DNA to upset the status quo. DISCO has the product-centricity, go-to-market scale, and velocity…
DISCO Announces Financial Result for Fourth Quarter and Fiscal Year 2021
“The legal industry is recognizing that cloud-native technology and applied artificial intelligence are game-changers. As we close on our first calendar year as a public company, we believe our results…
Empire Technologies Risk Management Group Acquires Cybersecurity and Data Protection Practice
According to Kenya Parrish-Dixon, General Counsel and COO at ETRM Group, “ETRM Group aspires to attract the most experienced professionals to our team. We are excited to introduce the new…
New and Improved? CSIRT Maturity Framework from ENISA
National CSIRTs play a crucial role in the collaboration and coordination between national and international communities and organizations. Cyber incidents and developments are inherently transnational and effective responses depend on…
Accelerating Workflows? Venio Announces Enhancements to VenioOne onDemand
According to Ankur Agarwal, Venio’s VP of Products, “Venio has always given users an option to use a UI that suits their needs. However, the pandemic caused many of our…
A Different Kind of Booster? Cybersecurity Best Practices for Improved Attack Resilience
This new report from ENISA and CERT-EU may be beneficial for cybersecurity, information governance, and legal discovery professionals operating in the eDiscovery ecosystem as they consider cyber discovery through the…
Five Great Reads on Cyber, Data, and Legal Discovery for February 2022
From biometric recognition and artificial intelligence to data embassies and processing guidelines, the February 2022 edition of the Five Great Reads on Cyber, Data, and Legal Discovery newsletter provides a…
Counterfeiters and Pirates? The 2021 Notorious Markets List from the USTR
According to Ambassador Katherine Tai, “The global trade in counterfeit and pirated goods undermines critical U.S. innovation and creativity and harms American workers. This illicit trade also increases the vulnerability of…
Defending Cyberspace? Developing a National Cybersecurity Strategy
To fully realize the potential of technology, states must align their national economic visions with their national security priorities. If the security risks associated with the proliferation of ICT-enabled infrastructure…
More Cowbell? SOC 2 Type 1 Compliance Certification Completed by Cowbell Cyber
According to Rajeev Gupta, co-founder and CPO at Cowbell Cyber, "Achieving SOC 2 Type 1 certification allows us to provide an additional layer of reassurance for our customers that their…