Latest Posts

From Glass House to Glassdoor? Transparency in the Workplace

Transparency is a growing feature of the world we live in, including the modern workplace. Workers, including those in the legal industry, have decided that Glassdoor ratings and reviews are worthy of their consideration.

Weaponizing Security? The Emerging Role of the CISO in eDiscovery

The role of the Chief Information Security Officer (CISO) is becoming the norm in eDiscovery companies as these companies grow their client base and venture into compliance and data breach prevention services. In fact, one industry expert sees the CISO role also being weaponized to support the sales function during client discussions about security.

Connect, Contest, and Challenge: Counter-Marketing and Social Media

While not a new concept, counter-marketing with social media does provide companies a unique way to increase awareness and demand while at the same time attempting to neutralize the impact of competitor social media marketing. The aim of social media counter-marketing is not to disparage competitors or detract from their social media efforts, but to translate their work into another opportunity to bring awareness to your company, message, and offerings.

Pivotal Acquisition Corp. to Merge with KLDiscovery

Pivotal Acquisition Corp., a public investment vehicle, and KLDiscovery, a global provider of electronic discovery and information governance services to Fortune 500 companies and top law firms, announced on May 20, 2019, that they have entered into a definitive agreement in which KLD and Pivotal will merge. As a result of the transaction, valued at approximately $800 million in enterprise value, KLD will become a publicly listed company.

Time For Outsourcing? A Look At BPO That Might Inform LPO

The main opportunity to push for greater innovation and to draw on specialist capabilities obviously comes at contract time, and there is good news here. To keep up with rapidly changing technology requirements, corporate buyers have been trimming the sourcing cycle. The average contract length for IT and BPO deals shrunk from 4.8 years in 2007 to 4.3 years in 2017, according to IDC, and we expect it will settle at slightly more than 4 years.

A Security Cause to Pause: The Microarchitectural Data Sampling (MDS) Vulnerability

A new group of Intel vulnerabilities, collectively called Microarchitecture Data Sampling (MDS), were disclosed last week. The vulnerabilities allow attackers to steal data as processes run on most machines using Intel chips. The vulnerabilities affect nearly every Intel processor released in the past decade and may be especially dangerous in multi-user environments like virtualized servers in data centers.