News & Analysis as of

Information Technology Best Practices Software

Shook, Hardy & Bacon L.L.P.

Ransomware Attacks Target SonicWall Firewall Vulnerability

Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over the past week, a large number of attacks by the ransomware group Akira have...more

EDRM - Electronic Discovery Reference Model

An In-Depth Look at the 2022 eDisclosure Systems Buyers Guide, Part 2

Purchasing Resources- When I said last time that the first 70+ pages is mostly dedicated to educational resources, that includes resources on the market, a procurement approach that can be used to select vendors and...more

Mitratech Holdings, Inc

Making a Policy Management Solution Rollout Easier for You and Your Organisation

We’re approaching the conclusion of this six-part series on how ease of use is the number one criterion when choosing a Policy Management solution. ...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide