Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Jannica Houben and Katarzyna Golonka on Complex Investigations
According to Cyberscoop, the cyber gang Cl0p “has claimed responsibility for attacks tied to vulnerabilities in software made by Cleo, an Illinois-based IT company that sells various types of enterprise software.” The gang...more
eDiscovery refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format. eDiscovery tools can also be...more
Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more
It’s no longer hype. Organizations are broadly looking to adopt Gen AI to drive productivity across their workforce. There’s also end-user demand to satisfy. People use Gen AI in their personal lives and want to use it...more
So far, 2024 has been another very busy year for U.S. cybersecurity regulation. Among the top priorities has been software security, as we previewed early this year. Companies that sell software to the federal government or...more
Like many organizations, Peloton is facing a legal challenge under the California Invasion of Privacy Act (CIPA) relating to the company’s alleged use of third-party technology on its website to intercept chat communications...more
With under six months to go until the European Union Digital Operational Resilience Act (DORA) becomes applicable on 17 January 2025, DORA implementation projects are running full steam ahead. DORA lays down uniform...more
In line with Group of Seven (G7) efforts to disrupt the Russian military-industrial base’s reliance on foreign IT systems, in June 2024 the U.S. Department of Commerce and the Department of the Treasury jointly issued new...more
In the aftermath of what could be one of the most widespread global information technology outages in history, organizations are putting a renewed focus on combating old vulnerabilities that can have cascading effects. ...more
Bill Gates has insider knowledge on the future of generative AI. He predicts there will be ‘two more turns of the crank’ on scaling, with the next ‘big frontier‘ being ‘metacognition.’ Gates describes ChatGPT’s metacognitive...more
On Friday July 19, 2024, CrowdStrike® Holdings, one of the largest cybersecurity technology companies in the world, announced that a faulty software update caused a global computer outage which ultimately disrupted many...more
As an eDiscovery software and services provider who has worked with hundreds of law firms, corporate legal and government teams over the past 20 years, we have learned ways to make the process of data collection for...more
The U.S. Department of Commerce's Office of Information and Communications Technology and Services (OICTS) within the Bureau of Industry and Security (BIS) issued a Final Determination on June 20, 2024, pursuant to Executive...more
On June 12, 2024, the U.S. Department of Treasury (Treasury), U.S. Department of State (State), and U.S. Department of Commerce (Commerce) announced another round of sanctions and export controls targeting Russia. In this...more
The Biden Administration’s recent expansion of sanctions and export controls to counter Russian aggression will impact non-U.S. financial institutions and increase compliance risks for the business software sector and other...more
On June 12, 2024, the United States took several hard-hitting sanctions- and export control-related actions intended to intensify pressure on the Russian government and hamper Russia’s ability to continue to support its war...more
On the eve of the 2024 Group of Seven (G7) Leaders’ Summit, the United States imposed new sanctions and export control measures against Russia further targeting sanctions evaders and, for the first time, the Russian...more
In March 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released the final version of its secure software development self-attestation common form (Form), requiring federal government contractors who...more
The United States Department of Defense’s (DoD) supplement to the Federal Acquisition Regulation (DFARS) requires the DoD to adopt a Modular Open System Approach (MOSA), which is a technical and business strategy for open and...more
The United States Department of Defense (“DoD”) recently published its Defense Industrial Base Cybersecurity Strategy 2024. For context, the DIB is comprised of more than 100,000 domestic and foreign companies or...more
(This is the fifth and final blog in a five-part series on streamlining public records request response.) When starting the journey in changing your processes around managing these requests, it can be like a hiker...more
We recently joined a webinar hosted by the EDRM for an insightful session featuring experts Doug Kaminski and Amy Sellars focused on the intricacies of vendor collaboration, legal partnerships, and effective strategies for...more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
Upgrading critical applications has become a common challenge for corporate IT departments. Software vendors can deploy major releases more quickly because of improvements in coding and testing tools and some tie eligibility...more
After two very difficult years in the tech sector, everyone is hoping for a comeback. We are looking at a more positive economic climate, the prospect of interest rates dropping, and there is much less talk of a recession...more