Latest Publications

Share:

Dating App Breach Exposes 900K Users: A Wake-Up Call for Cybersecurity

In a critical revelation within the realm of digital privacy, a significant data breach was uncovered involving key players in the dating app industry. Approximately 1.5 million explicit images from users of BDSM People,...more

Fluid Dynamics: ALM Report Reveals Evolving Legal Landscape Amid Record Profits and Technological Disruption

NEW YORK — In an industry traditionally bound by precedent and caution, the word “fluid” now best describes the rapidly changing legal landscape, according to ALM’s annual State of the Industry report presented at Legalweek...more

[Webinar] From Summation to AI Tokens: A Journey Through eDiscovery’s Most Transformative Shifts - April 16th, 12:00 pm - 1:00 pm...

The evolution of eDiscovery has been a journey from paper-based processes to a thriving legal tech ecosystem driven by innovation. In the next EDRM workshop on April 16 at noon EST, sponsored by HaystackID®, legal experts...more

23andMe’s Court-Supervised Restructuring: Navigating Turbulent Financial Waters

On March 23, 2025, 23andMe, a pioneer in the field of genetic testing and consumer healthcare, announced it had filed for Chapter 11 bankruptcy in the U.S. Bankruptcy Court for the Eastern District of Missouri. The objective...more

[Webcast Transcript] Discovering Data Quickly in High-Stakes White-Collar Investigations

Editor’s Note: White-collar investigations can send shockwaves through an organization, demanding swift, strategic, and legally sound responses. In a recent HaystackID® webcast, experts broke down the complexities of...more

Jaguar Land Rover Breach Highlights Growing Cybersecurity Risks in Automotive Sector

A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more

Inside TikTok’s U.S. Data Security Operation: A Rare Look at the Battle Over User Data

The controversy surrounding TikTok has dominated political discussions for years. Critics claim the app is a national security risk, a data funnel to the Chinese Communist Party, and a vehicle for foreign propaganda. TikTok,...more

Big Tech on Trial: DOJ Shifts Strategy in Google Antitrust Case

In recent developments, the U.S. Department of Justice (DOJ) has amended its approach in the antitrust case against Alphabet’s Google, refocusing its legal strategy in tackling the perceived monopolistic control exerted by...more

[Webcast Transcript] Data Minimization: Why Less is More

Editor’s Note: Effective data management is more critical than ever, and the latest HaystackID® webcast, “Data Minimization: Why Less is More,” offered expert insights on why organizations must take a strategic approach to...more

Rising Cyber Threats in Europe’s Financial Sector: An ENISA Overview

Between January 2023 and June 2024, cyber threats targeting Europe’s financial sector escalated, posing risks to banks, financial service providers, and regulatory bodies. According to the ENISA Threat Landscape: Finance...more

AI Playbook: UK Government’s Strategy for Responsible AI Adoption in the Public Sector

The United Kingdom is taking a strategic approach to artificial intelligence (AI) adoption within its public sector to drive economic growth and improve public services. Central to this effort is the UK’s AI Playbook, a...more

[EDRM Workshop Transcript] Managing Data Overload and Complexity in Catastrophic Events

Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more

The Great Encryption Standoff: Apple vs. the UK’s Surveillance Push

In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more

[Webcast Transcript] Protect Sensitive Data and Control Costs: An eDiscovery Blueprint for the Construction Industry

Editor’s Note: The recent HaystackID® webcast, “Protect Sensitive Data and Control Costs: An eDiscovery Blueprint for the Construction Industry,” explored the challenges of managing vast and complex construction data while...more

OpenAI Accuses DeepSeek of Unlawful Use of AI Models, Raising Ethical and Legal Concerns

In a major development within the global artificial intelligence (AI) industry, OpenAI has lodged serious accusations against DeepSeek, a Chinese AI startup, alleging that the latter has illegally utilized its proprietary...more

DeepSeek’s Disruption: A New Era in Global Tech Competition

On January 27, 2025, the global tech industry experienced a seismic shift with the introduction of DeepSeek, a Chinese artificial intelligence (AI) startup that unveiled an impressive large language model (LLM). This new...more

December 2024 Economic Trends and HSR Activity

The economic landscape in December 2024 revealed a dynamic interplay between consumer spending, corporate strategy, and transactional activity, offering critical insights into the evolving M&A environment. Recent data from...more

[Webinar] Workshop: Managing Data Overload and Complexity in Catastrophic Events - February 5th, 11:00 am - 12:00 pm CST

Data is generated faster than ever, and the magnitude of this reality is amplified during catastrophic events. The recent Los Angeles wildfires and other natural disasters bring to light the daunting challenge of managing an...more

Legal Data Intelligence: Leading the Charge in Data-Driven Legal Transformation

Amid the tidal wave of technological innovation, the legal industry finds itself grappling with an essential question: how can it transform the overwhelming chaos of digital data into a wellspring of actionable insights? The...more

Protecting Educational Data: Insights from the PowerSchool Breach

The PowerSchool data breach, discovered on December 28, 2024, serves as a powerful reminder of the persistent cybersecurity challenges confronting the education sector. PowerSchool, a leading provider of education technology,...more

Anticipated Surge in Mergers and Acquisitions for 2025: A Synthesis of Strategic Growth and Technological Advancements

As the global markets look towards 2025, a dynamic evolution is anticipated within the landscape of mergers and acquisitions (M&A). Key strategic drivers such as regulatory adjustments, monetary policy normalizations, and...more

AI-Driven Phishing: An Emerging Threat to Corporate Security

In an era marked by rapid technological advancement, artificial intelligence has emerged as a transformative force in cybersecurity threats, particularly in the domain of sophisticated phishing attacks. Recent developments...more

[Webcast Transcript] Breaking Down Barriers: Leveraging Unified AI and Cross-Functional Data Strategies to Drive Business Results 

Editor’s Note: HaystackID® brought together industry experts in a recent webcast to discuss the interplay of artificial intelligence (AI), data management, and cross-functional collaboration in modern organizations. The...more

International Cyber Defense Coalition Reports Significant Progress in Protecting Ukrainian Digital Infrastructure

December 2024 marks a pivotal milestone in international cybersecurity cooperation as the Tallinn Mechanism concludes its first year of operations, having mobilized over $210 million in targeted assistance for Ukraine’s...more

GDPR and AI Models: Key Insights from the EDPB’s Latest Opinion

The European Data Protection Board (EDPB) has released a comprehensive opinion addressing key data protection concerns related to the development and deployment of artificial intelligence (AI) models. The opinion, requested...more

82 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide