Closing The Loop

Articles on cybersecurity

The Dark Net: Where Attorneys' Information Is Bought & Sold

While the visible Internet is vast, the websites that you regularly access on your web browser represent only a fraction of what’s truly available online. There is, in fact, a significant section of the Interne... Eric Pesale   |     09 Aug 2017

Hackers Breach the Wall, Invade Westeros: Why Lawyers Should Pay Attention

The world of “Game of Thrones” has been invaded, pillaged, and laid to waste, but not by any Dothraki invaders, incestuous Lannisters, or Night King. By hackers. Unscrupulous cyberattackers, presumably bearing ... Casey C. Sullivan   |     01 Aug 2017

Who’s Afraid of a Biometric Boarding Pass?

In the not too distant future, airports could operate without boarding passes or even ID cards, whisking you away to your destination after a single biometric reading. That is, if a pilot program by the Transpo... Casey C. Sullivan   |     11 Jul 2017

Balancing Mobility, Agility, and Cybersecurity

Our quickly evolving workplaces make it easier than ever to get things done on the move and on the fly. Colleagues can “ping” each other from their phones with with late-night ideas, or review important docs fr... Casey C. Sullivan   |     10 May 2017

Everything Is One Thing and That’s Information Governance

When it comes to securing clients’ and businesses’ most sensitive data, more and more attention is being paid to eDiscovery. After all, the discovery process gathers a treasure trove of valuable information, fr... Casey C. Sullivan   |     04 May 2017

Why Lawyers Need to Know About State Data Breach Notice Laws

Hackers are increasingly targeting law firms, viewing them as a “one-stop shop” for sensitive lucrative client data. The examples are many: hackers breaking into M&A firms to steal info for insider trading; Rus... Eric Pesale   |     28 Apr 2017

Protecting Data in the Age of Cybercrime: CLE Webinar Now Available

There's a common adage among cybersecurity professionals: data is at it's most vulnerable when it's in motion. Well, eDiscovery is a process of motion. And it's also a process of replication. Under the EDRM-dri... Robert Hilson   |     08 Mar 2017
New Call-to-action

Subscribe To Our Blog

Webinar: How to Avoid eDiscovery Production Disasters

Posts by Topic

Additional Topics >>>

Let us know what you thought about this post.

Put your comment below.