Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Less is More Strategy for Data Risk Mitigation
Data Retention and Document Holds
Fintech Focus Podcast | Navigating IT and Security Risks in Fintechs in Light of Impending DORA Deadline
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
eDiscovery Needs Digital Forensics for a Mobile World
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
eDiscovery Tips: Helpful Questions to Ask Your Clients
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
Review Analytics for a New Era
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 114: Joe Dickinson, Cybersecurity Attorney Nexsen Pruet
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Innovation in Compliance - Episode 224 - Leveraging Communications as an Asset with Robert Cruz
Modernize your Information Governance: Building a Framework for Success
NGE On Demand: Cybersecurity Considerations for Emerging Companies with Michael Gray and David Wheeler
Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more
Through May 2025, corporate deal activity in the United States demonstrates remarkable resilience despite mounting economic pressures. Hart-Scott-Rodino (HSR) premerger notification filings through the first eight months of...more
Hudson Cook, LLP is proud to announce the launch of The Data Edge: Developments that Matter to Your Data Compliance, a new monthly webinar series designed to help privacy and compliance professionals stay informed and...more
ComplexDiscovery Editor’s Note: This featured article from ComplexDiscovery OÜ provides an examination of one of the most compelling sessions from the 2025 Dublin Tech Summit, where AI transcended analytics and delved into...more
Curious about how Exterro Intelligence features can transform your legal processes? Join our product experts for an exclusive live demo showcasing real-world applications of our latest AI-powered capabilities that can improve...more
An iPhone Knows Your Significant Locations - Keep in mind that iPhones use a particular method to track the smartphone’s location known as ‘significant locations’. ...more
The intersection of international diplomacy and digital governance has reached a critical inflection point with the U.S. State Department’s groundbreaking visa restriction policy announced May 28, 2025. Under Secretary of...more
Editor’s Note: As digital threats become increasingly sophisticated and data volumes continue to surge, email remains a cornerstone of modern investigations. In this timely webcast, HaystackID® experts John Wilson and Rene...more
You’ve cleaned up your data—now what? In the second part of this two-part webinar based on an actual case study, we’ll explore the next frontier: turning that defensible, well-managed data into a launchpad for AI-driven...more
What Happened? As the Trump Administration’s deregulatory, pro-innovation approach to emerging technology moves forward, the use of artificial intelligence has taken center stage, and it is clear that the Administration...more
Artificial intelligence is driving a transformation across industries, with unprecedented opportunities for innovation, automation, and efficiency. Yet as AI integrates more deeply into business processes, it also brings a...more
Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more
Every year, BakerHostetler collects, analyzes and compares key metrics on the incident response matters we handled in the prior year. The Data Security Incident Response (DSIR) Report presents key findings and trends, along...more
In the twenty ninth episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, Dorothe Schuch, Vice President of Forensic Logistics and Evidence Management at HaystackID, sits down with Kaylee & Mary to talk about...more
ComplexDiscovery Editor’s Note: The 1H 2025 eDiscovery Business Confidence Survey marks the 37th edition of this trusted industry snapshot, drawing insights from 77 professionals across the legal, technology, and corporate...more
Slack has emerged as one of the most critical tools for modern workplace communication. Its intuitive design, seamless app integrations, and channel-based conversations have made it a staple for real-time collaboration. But...more
Background Note: The Hart-Scott-Rodino (HSR) Act established the Premerger Notification Program, requiring certain mergers and acquisitions to be reported to the Federal Trade Commission (FTC) and the Department of Justice...more
How do you, as an organization, deal responsibly with data monitoring? And how do you ensure that you remain within the boundaries of privacy legislation? ACEDS Benelux, the regional chapter of ACEDS International , is...more
Discovery has always been a part of the legal process. It’s how both sides in a dispute exchange information—reviewing documents, asking questions, and surfacing the facts needed to argue their case. But as the world went...more
The Legal Data Intelligence (LDI) initiative has reached a significant milestone as it marks its first year of operation. Since its May 2024 launch, it has demonstrated remarkable growth and evolution. What began as an...more
Editor’s Note: Legal teams today are under mounting pressure to do more with less—manage growing datasets, meet tight deadlines, and control costs while maintaining visibility and security across matters. In response, the...more
From our M365 Academy Series, learn about the current state of cloud attachments, their behavior in Teams and OneDrive, and why you may need to update your traditional preservation strategies to manage them. ...more
In the twenty eighth episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, Aaron Pribil, Director of Product Management, sits down with Kaylee & Mary to talk about his journey to eDiscovery and HaystackID, his...more
Organizations face mounting challenges when it comes to managing legacy data across outdated platforms while meeting evolving legal and compliance demands. In this two-part webinar based on an actual case study, we’ll explore...more
The possibilities in the Microsoft Copilot universe continue to expand. Discover the latest Copilot features and related risks you should know about along with guidance on how to better manage them....more