Uncovering Hidden Risks: Ep 12 - Cloud Security Posture Management: Top Risks and Best Practice Solutions
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: Servient – What’s Next
Sitting with the C-Suite: eDiscovery Priorities – Thoughts on the Next Five Years
Sitting with the C-Suite: Looking to the Future – Legal Tech Predictions
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
When employees depart – voluntarily or involuntarily – they often leave behind a digital footprint that may be critical to investigations, litigation, or regulatory compliance. Ensuring their data is properly identified,...more
Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more
The question of how to handle “modern attachments” has become the hot topic that’s sweeping the ediscovery landscape this year. Major litigation involving Uber Technologies has led to extensive conversations on how to...more
Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more
Join Chiefs, Deputy Chiefs, and Directors of IT from across Canada and dive into the latest technological trends, tools and opportunities for law enforcement at Canadian Institute's 3rd Annual Police Tech Conference & Expo....more
DeepSeek, a Chinese artificial intelligence (“AI”) startup, recently made waves across the global AI landscape with the release of its latest open-source R1 model. While some versions of DeepSeek’s model can be downloaded and...more
In the early days of first-generation AI models, legal industry technology providers did not frequently encounter the question, “Where do my models live?” The assumption has always been that the models live where the data...more
Summary: For better security when using AI in eDiscovery, cloud-based large language models and AI governance practices are critical for your program. We outline some key security considerations and benefits of these...more
As more organizations across industry sectors store personal data with cloud storage vendors— including the three largest vendors in the world, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform—federal...more
Summary: Navigating eDiscovery in the era of modern data presents new complexities that can make or break a case. We explore five critical considerations outside counsel must address, including the implications of generative...more
Mobile forensic investigators often face significant challenges when triaging and collecting data from diverse devices, especially when dealing with cloud storage and cross-platform environments. The complexity of navigating...more
With organizations holding more and more data digitally, there is an increased need to ensure data remains accessible across the organization at any given time. To that end, many organizations use tools that synchronize the...more
The OIG, the nation’s leader in fighting fraud, waste and abuse of Medicare, Medicaid and other HHS programs, periodically publishes reports on how federal healthcare programs could improve....more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of July 22-28. Here’s what’s...more
The immediate challenge that often springs to mind related to antitrust Second Requests is managing vast volumes of data under stringent deadlines. These factors transform Second Requests into intense, high-stress endeavors....more
ComplexDiscovery Editor’s Note: As data security and privacy become increasingly crucial, small language models (SLMs) are emerging as essential tools for businesses and the public sector. Upstage Co. Ltd., an AI startup, is...more
Although there was a big post-pandemic push to move to the cloud, some law firms still find themselves at a crossroads between maintaining their traditional on-premises document management system (DMS) and transitioning to...more
Preparing for a Rule 26(f) meet and confer and codifying eDiscovery workflow decisions into an ESI protocol is more technically complex and challenging than ever before. In large part, this increased complexity is due to the...more
More than two decades in, cloud computing is no longer a technology that requires a herald or proselytizer. What began with government agencies and then financial institutions seeking expanded storage solutions and an...more
Modern investigations require modern data collection solutions to solve the complex challenges facing eDiscovery practitioners. With employees generating vast amounts of data stored across multiple platforms and applications,...more
Let’s say you’re moving, or about to move, firms, or maybe even starting your own practice. But your cases don’t stop just because your office is changing venues and many of those cases involve eDiscovery. So how do you...more
Cloud-based mobile device data is rapidly becoming more and more key to eDiscovery cases. 90% of investigators say that cloud-based forensic tools will become key in the future as more unique evidence moves to the cloud...more
In Re: Uber Technologies, Inc., Passenger Sexual Assault Litigation, 2024 WL 1772832 (N.D. Cal. Apr. 23, 2024), resolved a dispute over so-called “modern attachments” based on impressive and comprehensive technical...more
Cloud-based mobile device data is rapidly becoming more and more key to eDiscovery cases. 90% of investigators say that cloud-based forensic tools will become key in the future as more unique data moves to the cloud and...more
We have been talking about it since last year: the bill to secure and regulate the digital space ("SREN") has now been passed. The legislative process leading up to the enactment of the SREN bill has been slow (as a reminder:...more