TGC_WebEditor
More companies are focusing on container security to ensure that they don’t ship software with known vulnerabilities, to protect sensitive […]
As of this month Amazon has a patent that arms Alexa with a voice analyzer capable of revealing characteristics such […]
The threat of the rogue employee or the vengeful former-employee is a frequent subject of cybersecurity alerts, and it’s a […]
In the face of a largely ineffectual “patchwork system of federal and state laws,” the SEC has emerged as a major de facto U.S. regulator of cybersecurity…
How the next generation of e-discovery platforms is using analytics to drive efficiency, cost-savings and quality of results, and promising. to move e-discovery from the exclusive….
“Lifeless eyes dilate at your approach. Battery-operated lungs suck in stale air, hypnotically wheezing with inhuman rhythm. A plastic chest […]
In the standard Electronic Discovery Reference Model flow chart, the box farthest to the left refers to information governance – the process of getting your house in order…
A variation on the now common phishing scam, dubbed “vishing,” has until recently had a predictable modus operandi, beginning with […]
Recent global surveys by PWC and Deloitte found that most executives think blockchain technology is “scalable” and that it will […]
After a University of Minnesota student accused Richard Liu, a Chinese gazillionaire and founder of JD.com, of raping her last […]
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.