E-Discovery
More E-Discovery Articles
Cybersecurity
After the Breach: When cybersecurity fails, forensics specialists come in to investigate the theft
All the attention cybersecurity has garnered recently makes it easy to forget that computer forensics goes back long before the days of Dropbox, thumb drives, BYOD and the cloud. The contrast is not lost on RVM’s Greg Cancilla, who got his start during a time that now feels like a bygone era...
Read MoreTechnology
Information Governance Insights: Preserving and Collecting Structured Electronic Data Is Tricky
Today’s litigators are keenly aware of the need to effectively preserve electronically stored information (ESI) when new legal matters arise. And dealing with various types of unstructured data such as user-created documents and email messages has become quite routine. But preserving and...
Read MoreCybersecurity
The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically
These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention. Acronyms and...
Read MoreRecent E-Discovery Video
Artificial Intelligence