All Articles

Discovery

Turning Liabilities into Assets: To make intelligent decisions during litigation, you need to fully understand the electronic data

It was a good case, a simple case, alleging wrongful discharge. The merits were in favor of the defense, and, as evidence came in, it was lining up cleanly and consistently with the defendant’s recollection of the events. Barring any unforced errors, it would be a relatively smooth win. Then...

Read More

The Ethical Hacker: Best Defense for Today’s Ransomware? Basic IT

I’ve been fairly consistent in my opinions, and I hope my viewpoints are well known by now. People, process and policy are the ways to win the cyber war and secure your organization against the threats it faces in cyberspace. I truly believe it’s more a people problem than a technology...

Read More

It’s the Context, Not the Content: Data-based discovery has shifted priorities

In the legal world, there was a simpler time – a time before the “e” in e-discovery. When the Federal Rules of Civil Procedure were established in 1938, handwritten and typewritten documents were the primary methods for creating content. If you wanted to duplicate content,...

Read More

Technology

The Ethical Hacker: Are You Accounting for One of Your Largest Cybersecurity Risks?

I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams to help assess...

Read More

Cybersecurity

The Ethical Hacker: How to Protect Your Company from Ransomware Attacks

Ransomware. Just the word itself is enough to chill the hearts of everyone from personal users to IT professionals to senior executives. May 12th’s massive attack took down hundreds, perhaps thousands, of companies and unknown numbers of individuals and institutions, including the United...

Read More

Cybersecurity

The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically

These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention.     Acronyms and...

Read More

Technology

The Ethical Hacker: Field Notes: Leveraging IoT Data Isn’t a Budget Killer

Like many, I attended LegalTech Jan. 31 – Feb. 2 and enjoyed catching up with old friends while seeing new, emerging technologies. Did you see the car forensics kit being offered by Berla? That was pretty cool and something I am definitely going to keep an eye on. One of the things I...

Read More