Latest Posts › Data Security

Share:

Engineering Cyber Resilience: Lessons from the Tallinn Mechanism

When the lights stayed on in Kyiv during a wave of missile attacks in early 2024, Ukrainian officials quietly acknowledged a second line of defense that received far less public attention than the nation’s air-defense...more

AI Summaries in Google Discover: Rethinking Information Governance, Discovery, and Security

In a bold initiative to integrate AI across various platforms, Google has launched AI-generated summaries in its Discover product, a personalized news feed widely accessible on Android and iOS devices. These AI summaries...more

University of Exeter and CCDCOE Publish Cyber Law Handbook Guiding Nation States in Peace and Conflict

At a pivotal moment in the evolution of cyberspace governance, a new initiative led by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) and the University of Exeter has produced a timely and practical resource...more

What UK Law Firms Really Want: Procurement Insights from LegalTechTalk 2025

Senior technology leaders from major UK law firms reveal evolving procurement priorities that go far beyond traditional security requirements UK law firms are fundamentally reshaping how they evaluate and purchase legal...more

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

AT&T Customer Data Resurfaces on Dark Web in Enhanced, Decrypted Format

According to an AT&T spokesperson, this is not accurate. Social Security Numbers and Dates of Birth were already available in plain text in the original compromised dataset from 2024 (in separate files that could be...more

Click. Notify. Exfiltrate. Why the Most Damaging Threats Start in Your Inbox

Editor’s Note: Email remains the most reliable and comprehensive source of evidence in digital investigations, often providing insights that other platforms cannot. As threats become more sophisticated and data volumes grow,...more

The Era of Shadow AI: New Challenges for Corporate Security

Artificial intelligence is driving a transformation across industries, with unprecedented opportunities for innovation, automation, and efficiency. Yet as AI integrates more deeply into business processes, it also brings a...more

Ransomware Unveiled: How the LockBit Breach Exposes the Digital Extortion Economy

xThe cybersecurity community has witnessed a significant development with the recent compromise of LockBit’s operational infrastructure, providing extraordinary visibility into one of the most sophisticated...more

Dating App Breach Exposes 900K Users: A Wake-Up Call for Cybersecurity

In a critical revelation within the realm of digital privacy, a significant data breach was uncovered involving key players in the dating app industry. Approximately 1.5 million explicit images from users of BDSM People,...more

[Webcast Transcript] Discovering Data Quickly in High-Stakes White-Collar Investigations

Editor’s Note: White-collar investigations can send shockwaves through an organization, demanding swift, strategic, and legally sound responses. In a recent HaystackID® webcast, experts broke down the complexities of...more

Jaguar Land Rover Breach Highlights Growing Cybersecurity Risks in Automotive Sector

A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more

Inside TikTok’s U.S. Data Security Operation: A Rare Look at the Battle Over User Data

The controversy surrounding TikTok has dominated political discussions for years. Critics claim the app is a national security risk, a data funnel to the Chinese Communist Party, and a vehicle for foreign propaganda. TikTok,...more

[EDRM Workshop Transcript] Managing Data Overload and Complexity in Catastrophic Events

Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more

The Great Encryption Standoff: Apple vs. the UK’s Surveillance Push

In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more

[Webcast Transcript] Protect Sensitive Data and Control Costs: An eDiscovery Blueprint for the Construction Industry

Editor’s Note: The recent HaystackID® webcast, “Protect Sensitive Data and Control Costs: An eDiscovery Blueprint for the Construction Industry,” explored the challenges of managing vast and complex construction data while...more

Legal Data Intelligence: Leading the Charge in Data-Driven Legal Transformation

Amid the tidal wave of technological innovation, the legal industry finds itself grappling with an essential question: how can it transform the overwhelming chaos of digital data into a wellspring of actionable insights? The...more

Protecting Educational Data: Insights from the PowerSchool Breach

The PowerSchool data breach, discovered on December 28, 2024, serves as a powerful reminder of the persistent cybersecurity challenges confronting the education sector. PowerSchool, a leading provider of education technology,...more

[Webcast Transcript] Breaking Down Barriers: Leveraging Unified AI and Cross-Functional Data Strategies to Drive Business Results 

Editor’s Note: HaystackID® brought together industry experts in a recent webcast to discuss the interplay of artificial intelligence (AI), data management, and cross-functional collaboration in modern organizations. The...more

Educational Institutions and Cloud Providers Grapple with Data Breach Challenges

A series of recent cybersecurity breaches reveals significant vulnerabilities within educational and technology institutions, underscoring the urgent need for strengthened defenses. Among the most prominent incidents is the...more

Microsoft Delays Recall Rollout Amid Privacy Concerns

Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more

New Cyber Regulations Define Battle Lines in Corporate and Infrastructure Security

Amidst an ever-evolving cyber threat landscape, a recent slew of regulatory updates and cybersecurity standards are defining a new battlefront for securing critical infrastructure and corporate data across varying sectors....more

[Virtual Workshop Transcript + Recording] Deep Dive into Generative AI with eDiscovery Experts

Editor’s Note: There’s much conversation around how our industry should best use generative artificial intelligence (gen AI) to do our jobs. On March 19, 2024, HaystackID sponsored an EDRM virtual workshop that explored how...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide