A Window into Malware? The New Malware Reverse Engineering Handbook from CCDCOE

According to Wikipedia, malware analysis is the study or process of determining the functionality, origin, and potential impact of a given malware sample. In this new handbook from the NATO Cooperative Cyber Defence Centre of Excellence, the authors share concise insight and general techniques for analyzing the most common malware types for the Windows OS.

REvil With a Cause? The Kaseya Ransomware Attack

An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat-processor JBS after a Memorial Day attack, infected thousands of victims in at least 17 countries on July 2, 2021, largely through firms that remotely manage IT infrastructure for multiple customers.

Risk and Reward? Considering Cyber Insurance and the Challenge of Cybersecurity

According to the recent report from the UK’s Royal United Services Institute for Defence and Security Studies (RUSI), post-incident services have become one of the success stories of cyber insurance for both insurers and insureds. For insurers, they may reduce incident costs. For purchasers of cyber insurance – particularly SMEs – they provide access to services and expertise during crises.

A Comprehensive Cyber Discovery Resource? The DoD Cybersecurity Policy Chart from CSIAC

The Cyber Security and Information Systems Information Analysis Center (CSIAC) is chartered to leverage best practices and expertise from government, industry, and academia on cybersecurity and information technology. On June 24, 2021, the CSIAC published the latest version of its DOD Cybersecurity Policy Chart. The DoD Cybersecurity Policy Chart captures a tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware of, in a helpful organizational scheme.

Stressed Out? Towards Remediating DDoS Attacks

Addressing the DDoS problem has become more important than ever. The global pandemic almost instantly shifted the whole education system and jobs that can be done online to the home. Accessing different remote systems has become a necessity for all those affected. DDoS attacks against many organizations could previously have had only a limited negative effect and reputational damage and the daily operations of employees and students could continue in person or via locally accessible systems. Now the attack can stop all work and education for remote users relying on the targeted system.

A Mushrooming Opportunity? Canopy Secures AI-Powered Data Breach Response Patent

According to Ralph Nickl, CEO and co-founder of Canopy, “Until recently, data protection regulations have outpaced technology and processes. Our software enables people to significantly expedite the assessment of compromised data following a security incident so that, in the event of a breach, they can respond within required timeframes and help minimize harm by notifying affected individuals faster.”

Protecting Pipelines? DHS Announces New Cybersecurity Requirements

According to Secretary of Homeland Security Alejandro N. Mayorkas, “The cybersecurity landscape is constantly evolving and we must adapt to address new and emerging threats. The recent ransomware attack on a major petroleum pipeline demonstrates that the cybersecurity of pipeline systems is critical to our homeland security. DHS will continue to work closely with our private sector partners to support their operations and increase the resilience of our nation’s critical infrastructure.”

A Breach Niche? Exterro Announces Smart Breach Review

According to Exterro Founder and CEO Bobby Balachandran, “Speed and accuracy are of the utmost importance when conducting large breach reviews. Historically, organizations have tried to create their own cobbled-together solutions or repurpose technology not built for the task to understand, report on, and mitigate data breaches. The result was slow ingestion, processes that don’t scale, and inflexible data definitions that cannot detect emerging and important data types like PHI. With Exterro Smart Breach Review, our customers can now complete even the largest breach reviews in less time using fewer resources. The software’s AI-led identification and automated report data generation also significantly reduce the potential for errors and omissions.”

U.S. Department of Treasury Takes Actions to Counter Ransomware

According to Treasury Secretary Janet L. Yellen, “Ransomware and cyber-attacks are...

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE): September 2021 Cyber Events Report

The twelfth installment in the cyber events series published by the...

[Legal Education Webcast] Breaches, Responses, and Challenges: Cybersecurity Essentials That Every Lawyer Should Know

Every large corporation and organization today face the significant threat of...

Classifying Ransomware? A Ransomware Classification Framework Based on File-Deletion and File-Encryption Attack Structures

This paper evaluates attack methodologies of a ransomware attack: the underlying...

Mitratech Acquires Alyne

According to Mike Williams, CEO of Mitratech, "The combination of Alyne...

Magnet Forensics Acquires DME Forensics

According to the announcement, under the terms of the agreement, Magnet...

Consilio to Acquire Legal Consulting and eDiscovery Business Units of Special Counsel from Adecco

According to Laurie Chamberlin, Head of Professional Recruitment and Solutions North...

Nuix Acquires Natural Language Processing Company

According to Nuix CEO Rod Vawdrey, “Topos will strengthen Nuix’s product...

A New Era in eDiscovery? Framing Market Growth Through the Lens of Six Eras

There are many excellent resources for considering chronological and historiographical approaches...

An eDiscovery Market Size Mashup: 2020-2025 Worldwide Software and Services Overview

While the Compound Annual Growth Rate (CAGR) for worldwide eDiscovery software...

Resetting the Baseline? eDiscovery Market Size Adjustments for 2020

An unanticipated pandemeconomic-driven retraction in eDiscovery spending during 2020 has resulted...

Home or Away? New eDiscovery Collection Market Sizing and Pricing Considerations

One of the key home (onsite) or away (remote) decisions that...

Five Great Reads on Cyber, Data, and Legal Discovery for September 2021

From countering ransomware to predictive coding and packaged services, the September...

Five Great Reads on Cyber, Data, and Legal Discovery for August 2021

From the interplay of digital forensics in eDiscovery to collecting online...

Five Great Reads on Cyber, Data, and Legal Discovery for July 2021

From considerations for cyber insurance and malware to eDiscovery business confidence...

Five Great Reads on eDiscovery for June 2021

From remediating cyberattacks to eDiscovery pricing, the June 2021 edition of...

More Keepers? Predictive Coding Technologies and Protocols Survey – Fall 2021 Results

From the most prevalent predictive coding platforms to the least commonly...

Glowing Expectations? Eighteen Observations on eDiscovery Business Confidence in the Summer of 2021

In the summer of 2021, 63.3% of survey respondents felt that...

Issues Impacting eDiscovery Business Performance: A Summer 2021 Overview

In the summer of 2021, 24.4% of respondents viewed increasing types...

Looking Up? eDiscovery Operational Metrics in the Summer of 2021

In the summer of 2021, 80 eDiscovery Business Confidence Survey participants...