Uncovering Hidden Risks: Ep 12 - Cloud Security Posture Management: Top Risks and Best Practice Solutions
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: Servient – What’s Next
Sitting with the C-Suite: eDiscovery Priorities – Thoughts on the Next Five Years
Sitting with the C-Suite: Looking to the Future – Legal Tech Predictions
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
2023 was the most devastating year yet for ransomware attacks, with businesses forking over $1 billion in ransom payments for the first time ever – and 2024 is expected to be even worse. Beyond the payments, the average cost...more
Hosted by American Conference Institute, the 13th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that will dive into the intricacies of...more
On November 9, 2020, the U.S. Federal Trade Commission (“FTC”) announced a proposed settlement with Zoom Video Communications, Inc. (“Zoom”), a video conferencing provider, to resolve claims that Zoom deceived users about the...more
Storage infrastructure, along with computing and network infrastructures, represents one of the fundamental pillars of Information Technology (IT). Just like computing and networking, the storage infrastructure landscape is...more
As more organizations find themselves under scrutiny for the way they collect and use consumer data, maintaining CCPA compliance has never been more important. CCPA has been introduced to give control back to consumers,...more
The State Department has adopted an important new ITAR amendment confirming that if controlled technical data is encrypted using end-to-end encryption, the transfer of such data outside the U.S. is not considered an export...more
• On December 26, 2019, DDTC published an interim final rule that would allow, under certain conditions, encrypted technical data and software that is subject to the ITAR to be sent, shipped or stored outside the United...more
We are living in a rapidly changing world (trite, I know) where companies have to focus on data privacy and security for a variety of reasons. Consumers and constituents are concerned about the safety and privacy of personal...more
• European Commission publishes survey on concept of “Specially Designed for Military Use,” and issues request for input for possible EU commercial policy measures targeting the United States • Netherlands introduces...more
Now more than ever before there is an increased demand for employees to share and collaborate on documents with people inside and outside of their respective organizations. For this reason, organizations of all shapes and...more
Decentralized cloud storage programs, smart contracts, and the shared economy– will they combine to be a mainstream method of storage method of the future? A number of companies are working to make it a reality. One, Sia...more