More E-Discovery Articles

Cybersecurity

After the Breach: When cybersecurity fails, forensics specialists come in to investigate the theft

All the attention cybersecurity has garnered recently makes it easy to forget that computer forensics goes back long before the days of Dropbox, thumb drives, BYOD and the cloud. The contrast is not lost on RVM’s Greg Cancilla, who got his start during a time that now feels like a bygone era...

Read More

Technology

Information Governance Insights: Preserving and Collecting Structured Electronic Data Is Tricky

Today’s litigators are keenly aware of the need to effectively preserve electronically stored information (ESI) when new legal matters arise. And dealing with various types of unstructured data such as user-created documents and email messages has become quite routine. But preserving and...

Read More

Cybersecurity

The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically

These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention. Acronyms and...

Read More

Recent E-Discovery Video