“We’re merely scratching the surface of what the application of AI to our industry can mean. Our customers recognize that while AI offers immense possibility, it must be thoughtfully designed and applied to address use cases that yield specific business outcomes,” said Mike Gamson, Chief Executive Officer at Relativity.
According to Secretary of Homeland Security Alejandro N. Mayorkas, “The cybersecurity landscape is constantly evolving and we must adapt to address new and emerging threats. The recent ransomware attack on a major petroleum pipeline demonstrates that the cybersecurity of pipeline systems is critical to our homeland security. DHS will continue to work closely with our private sector partners to support their operations and increase the resilience of our nation’s critical infrastructure.”
From an investigative report on how an Australian Stock Exchange (ASX) float went sour to investor concerns and reports of talent retention challenges, the following aggregation of recent articles and announcements on leading investigative and analytics software company Nuix may be of interest to business, legal, and information technology professionals within the eDiscovery ecosystem.
According to Ankur Agarwal, VP of Products at Venio, “At Venio, we know that unintended sharing of confidential data in the early days of litigation is the number one cause of poor case results. Venio ECA was designed to prevent confidential data exposure, allowing companies to reduce risks, control costs, and ensure their data remains secure.”
From cyber discovery and data breaches to business of law and salary surveys, the May 2021 edition of the Five Great Reads on eDiscovery newsletter provides a selection of recent research, reports, and articles to update and inform legal, business, and information technology professionals in the eDiscovery ecosystem.
According to Exterro Founder and CEO Bobby Balachandran, “Speed and accuracy are of the utmost importance when conducting large breach reviews. Historically, organizations have tried to create their own cobbled-together solutions or repurpose technology not built for the task to understand, report on, and mitigate data breaches. The result was slow ingestion, processes that don’t scale, and inflexible data definitions that cannot detect emerging and important data types like PHI. With Exterro Smart Breach Review, our customers can now complete even the largest breach reviews in less time using fewer resources. The software’s AI-led identification and automated report data generation also significantly reduce the potential for errors and omissions.”
According to the Apt Search 2021 Salary Survey, in a competitive market, the right opportunity is enough to poach the most experienced professionals. Motivations change with experience and it’s not always about the salary. It is often those companies that can provide a distinct career roadmap and demonstrate the impact a person can make in their team, that succeed in securing experienced and talented individuals. Clear career roadmaps, which have grown in importance during the pandemic for candidates, have to become prominent in 2021 and beyond.
In 2020, the FBI’s Internet Crime Complaint Center (IC3) received 19,369 Business Email Compromise (BEC)/ Email Account Compromise (EAC) complaints with adjusted losses of over $1.8 billion. BEC/EAC is a sophisticated scam targeting both businesses and individuals performing transfers of funds. The scam is frequently carried out when a subject compromises legitimate business email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.
As data volumes skyrocket, the shape of data changes and teams move more work in-house, it’s critical that our customers are able to automate and streamline processes and gain insights quickly,” said Chris Brown, Chief Product Officer at Relativity. “Not only did we anticipate this change in the shape of data, but we’ve been actively investing in next-generation legal and compliance features to power the discovery of truth in these datasets in the years ahead.”
The 10th installment in a series published by the NATO Cooperative Cyber Defence Center of Excellence (CCDCOE) designed for military and national security decision-makers looks at various ways a supply chain could be compromised as was the case for SolarWinds, the political response to the SolarWinds attack and much more. The new CCDCOE report also highlights the growing interest towards strategic decision-making exercises focusing on threats in the cyber domain.