All Articles
Discovery
Turning Liabilities into Assets: To make intelligent decisions during litigation, you need to fully understand the electronic data
It was a good case, a simple case, alleging wrongful discharge. The merits were in favor of the defense, and, as evidence came in, it was lining up cleanly and consistently with the defendant’s recollection of the events. Barring any unforced errors, it would be a relatively smooth win. Then...
Read MoreThe Ethical Hacker: Best Defense for Today’s Ransomware? Basic IT
I’ve been fairly consistent in my opinions, and I hope my viewpoints are well known by now. People, process and policy are the ways to win the cyber war and secure your organization against the threats it faces in cyberspace. I truly believe it’s more a people problem than a technology...
Read MoreIt’s the Context, Not the Content: Data-based discovery has shifted priorities
In the legal world, there was a simpler time – a time before the “e” in e-discovery. When the Federal Rules of Civil Procedure were established in 1938, handwritten and typewritten documents were the primary methods for creating content. If you wanted to duplicate content,...
Read MoreTechnology
The Ethical Hacker: Are You Accounting for One of Your Largest Cybersecurity Risks?
I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams to help assess...
Read MoreCybersecurity
The Ethical Hacker: How to Protect Your Company from Ransomware Attacks
Ransomware. Just the word itself is enough to chill the hearts of everyone from personal users to IT professionals to senior executives. May 12th’s massive attack took down hundreds, perhaps thousands, of companies and unknown numbers of individuals and institutions, including the United...
Read MoreCybersecurity
The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically
These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention. Acronyms and...
Read MoreTechnology
The Ethical Hacker: Field Notes: Leveraging IoT Data Isn’t a Budget Killer
Like many, I attended LegalTech Jan. 31 – Feb. 2 and enjoyed catching up with old friends while seeing new, emerging technologies. Did you see the car forensics kit being offered by Berla? That was pretty cool and something I am definitely going to keep an eye on. One of the things I...
Read More