[Legal Tech Market Update] Two Billion Dollars and Counting – A SOLID West Talk
Knox Capital Operating Partner Mike Bryant presents a short, eight-minute TED-style talk on investments and investing in the legal tech market during SOLID West on February 28, 2019, in San…
Automating eDiscovery: A Strategic Framework
The Concise Framework for Discovery Automation takes the overall process of discovery, breaks it down into a data discovery component and a legal discovery component, aligns these components with insight…
Say Again? The HSR Act and the Premerger Notification Program
While the percentage of transactions in which a Second Request was issued by either the FTC or DOJ was only 2.7% in 2015, 3.0% in 2016, and 2.6% in 2017,…
Companies are Increasing Investment in Detecting “Bad Behaviors”
Contextual analysis technology is still in early adoption stages among many Fortune 500 companies. With this advanced technology, companies have the ability to pinpoint behavioral red flags and be empowered…
Cloud Security Alliance Debuts Internet of Things (IoT) Controls Framework and Accompanying Guide
The Cloud Security Alliance (CSA) today announced the release of the CSA IoT Controls Framework, its first such framework for IoT which introduces the base-level security controls required to mitigate…
Have You Tried Using a ‘Nearest Neighbor Search’?
A Nearest Neighbor Search is perhaps the simplest procedure you might conceive of if presented with a machine-learning-type problem while under the influence of some sort of generalized "veil of ignorance".…
Actively Learning? Predictive Coding Technologies and Protocols Survey – Spring 2019 Results
The Predictive Coding Technologies and Protocols Survey is a non-scientific survey designed to help provide a general understanding of the use of predictive coding technologies, protocols, and workflows by data…
The Challenge of Mobile Security: New Cybersecurity Practice Guide from NIST
The NIST cybersecurity practice guide, Mobile Device Security: Cloud and Hybrid Builds, demonstrates how commercially available technologies can meet your organization’s needs to secure sensitive enterprise data accessed by and/or stored…
AI and Automation: From Removing Workers to Improving Quality
Just because a task can be automated doesn’t always mean that people will get replaced. In the 30 years after ATMs were introduced, the number of bank tellers increased slightly. Removing workers…
HIPAA, the HITECH Act, and Protected Health Information
It is important that all covered entities, business associates, and subcontractors dealing with PHI ensure that eDiscovery providers supporting them adhere to HIPAA and HITECH Act compliance requirements.