News & Analysis as of

e-Discovery Professionals Cybersecurity Today's Popular Updates

HaystackID

AI Summaries in Google Discover: Rethinking Information Governance, Discovery, and Security

HaystackID on

In a bold initiative to integrate AI across various platforms, Google has launched AI-generated summaries in its Discover product, a personalized news feed widely accessible on Android and iOS devices. These AI summaries...more

EDRM - Electronic Discovery Reference Model

Quantum Leap: Google Claims Its New Quantum Computer Provides Evidence That We Live in a Multiverse

In the history of technological revolutions, there are moments that challenge not only our understanding of what is possible but the very nature of reality itself. Google’s latest refinement to its quantum computer, Willow,...more

HaystackID

[Webcast Transcript] Breaking Down Barriers: Leveraging Unified AI and Cross-Functional Data Strategies to Drive Business Results 

HaystackID on

Editor’s Note: HaystackID® brought together industry experts in a recent webcast to discuss the interplay of artificial intelligence (AI), data management, and cross-functional collaboration in modern organizations. The...more

EDRM - Electronic Discovery Reference Model

From Moscow to Pyongyang: Cyber Threats Revealed by Sandra Joyce at the Tallinn Digital Summit

ComplexDiscovery Editor’s Note: Sandra Joyce’s keynote at the Tallinn Digital Summit 2024 offers a vital look into the shifting dynamics of the cyber threat landscape. As an annual gathering of leaders from the digitally...more

Association of Certified E-Discovery...

Tips for Paralegals and Litigation Support Professionals – July 2024

July 6, 2024 – Rufus – How to Create Bootable Media with ISO Files If you have a flash drive or disc from which you want to access a program when booting up in BIOS, the data can be saved in an .iso file – which acts as a...more

HaystackID

The Critical Role of CFIUS in Safeguarding U.S. National Security: Insights and Implications for Technology and Legal...

HaystackID on

Editor’s Note: The Committee on Foreign Investment in the United States (CFIUS) plays a pivotal role in regulating foreign investments in American companies, particularly those that could impact national security. This...more

HaystackID

Cybersecurity Experts Urge Responsible AI Adoption, Not Overreliance

HaystackID on

Editor’s Note: This article covers valuable insights on artificial intelligence’s (AI) evolving role in cybersecurity and incident response shared during an expert panel discussion. As cybersecurity, information governance,...more

Hanzo

Perspectives for Legal on AI, Machine Learning, and Large Language Models

Hanzo on

Artificial Intelligence (AI) has long ceased to be the stuff of science fiction and is now deeply embedded in our daily lives. While it's essential to understand AI's incredible capabilities, it's equally crucial for legal...more

EDRM - Electronic Discovery Reference Model

DefCon Chronicles: Sven Cattell’s AI Village, ‘Hack the Future’ Pentest and His Unique Vision of Deep Learning and Cybersecurity

DefCon’s AI Village - Sven Cattell, shown above, is the founder of a key event at DefCon 31, the AI Village. The Village attracted thousands of people eager to take part in its Hack The Future challenge. At the Village I...more

EDRM - Electronic Discovery Reference Model

DefCon Chronicles: Hackers Respond to President Biden’s Unprecedented Request to Come to DefCon to Hack the World for Fun and...

Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more

HaystackID

[Webcast Transcript] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and...

HaystackID on

Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more

HaystackID

[Webinar] Don’t Throw the Baby out with the Bathwater: Back to the Basics in AI for eDiscovery - June 28th, 12:00 pm - 1:00 pm EDT

HaystackID on

With the discussion around the impact of generative AI dominating the dialogue within the legal services industry, it is easy to buy into the hype without considering if the technology is the appropriate tool for the task. ...more

EDRM - Electronic Discovery Reference Model

Testing a Red Team’s Claim of a Successful “Injection Attack” of ChatGPT-4 Using a New ChatGPT Plugin

On May 12, 2023, Chat GPT-4 began its release to the public of two new features in GPT-4, Web Browsing and Plugins. Just a few days later, a red-team instructor, Johann Rehberger, claimed to have made a successful indirect...more

Nextpoint, Inc.

Legal Tech Layoffs… Are they Really Inevitable?

Nextpoint, Inc. on

Recent legal tech layoffs are part of a larger trend of cutbacks in the tech industry. What will the consequences be? We can look at the volatile history of tech for clues. With the looming possibility of a recession,...more

HaystackID

Navigating International Discovery Restrictions: Seven Recommendations

HaystackID on

Background Note: International discovery exercises and investigations can be a complex and challenging process for cybersecurity, information governance, and eDiscovery professionals. Navigating the different laws and...more

EDRM - Electronic Discovery Reference Model

[Webinar] NIST CSF 2.0 – Back to the Future - March 7th, 1:00 pm - 2:15 pm ET

GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more

EDRM - Electronic Discovery Reference Model

Cyber Fundamentals: Cybersecurity as Part of Risk Management - Cyber Risk Management Chronicles, Episode II

Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more

EDRM - Electronic Discovery Reference Model

Zero Trust Networks

A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more

EDRM - Electronic Discovery Reference Model

Ransomware Reduces Costa Rica to Pen and Paper

This story has been covered across cybersecurity media, but it’s so big I’m surprised it hasn’t been covered even more, by mainstream media. A ransomware attack by the Conti ransomware group has left the Costa Rican...more

J.S. Held

Safeguarding Cloud-Based Data & Mitigating the Cyber Risks Associated with a Remote Workforce

J.S. Held on

Efficiency, scalability, speed, increased cost savings, and advanced security for highly sensitive data remain in high demand by users of eDiscovery services. To meet that demand, cloud technology promised several of those...more

Association of Certified E-Discovery...

[Webinar] Cybersecurity Basics for Legal Practitioners - April 19th, 1:00 pm - 2:00 pm EDT

Join us for a webinar on basic cyber information regarding data protection, data privacy, cybersecurity requirements PII and Sensitive PII, cybersecurity requirements for Third Party vendors, Cyber insurance in the age of...more

Association of Certified E-Discovery...

[Webinar] Data Privacy for eDiscovery Pros: Strategy and Execution - March 17th, 1:00 pm - 2:00 pm EDT

This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more

HaystackID

[Webcast Transcript] Data Forensic Investigations Exploitation by Concept Searching

HaystackID on

Editor’s Note: On February 16, 2022, HaystackID shared an educational webcast designed to present and explore the foundations of analytics and highlight workflows, methods, and applications that can be leveraged in compliance...more

HaystackID

[Webcast Transcript] Understanding Information Governance, Data Privacy, and Data Breach Exposure

HaystackID on

Editor’s Note: On December 1, 2021, HaystackID shared an educational webcast designed to present and describe a framework for deploying and enhancing organizational information governance programs....more

Association of Certified E-Discovery...

[Webinar] The Intersection of eDiscovery and Data Security Incidents - November 30th, 1:00 pm - 2:00 pm EST

The Coronavirus pandemic is moving more organizations to remote working models. This enhances the potential trajectory for data security incidents and other information exfiltration to increase dramatically. The number of...more

38 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide