X

big data

How Data Analytics can Empower Strategic Data Decisions

The sheer volume of data is exploding, so much so that a puny one gigabyte of storage on one lowly…

Content Archiving for eDiscovery

Content Archiving for eDiscovery helps you meet the ever-present demands of potential litigation, reduce the costs of e-discovery and improve…

Cyber Security Tips for Safe Online Shopping This Black Friday & Cyber Monday

With Black Friday and Cyber Monday right around the corner, it’s a fitting time to remember to focus on using safe online browsing habits…

Mobile Device Encryption: A Brief Look at the Pros and Cons

The topic of mobile device encryption is more talked about than ever before. Many individuals and companies alike are spending…

New In-Depth Cybersecurity Report From Association of Corporate Counsel

The Association of Corporate Counsel (ACC) has released their key findings and the full report from their 2020 STATE OF…

Legalweek New York 2020: LegalCIO, Legal Business Strategy, Legaltech

Legalweek is one of the industries most prominent and thought forward events that pulls litigation support providers, service partners, practitioners,…

Mitigating Cloud Vulnerabilities – NSA Publish Guidance

Extract from the National Security Agency Cybersecurity Information Update

Assess Risk After a Breach – Including Security Breach Notification Laws By State

A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted…

IoT (Internet of Things) Snapshot

Technology is connecting our lives like never before due to countless Wi-Fi enabled gadgets and thousands of mobile applications. The…

Biometric Information Privacy Act at a Glance

The BIPA guards against the unlawful collection and storing of biometric information.