December 09, 2015 | Legaltech News
ACC Study: Almost One-Third of In-House Counsel Say They Have Had Data BreachEmployee error is the most likely cause of a breach, the study shows.
By Ed Silverstein
3 minute read
December 04, 2015 | Legaltech News
Technology Provides 'Digital Trail' of Evidence as Authorities Investigate California Mass ShootingQuestions arise how and when to subject technology and social media data to searches.
By Ed Silverstein
4 minute read
December 04, 2015 | Legaltech News
Technology Provides 'Digital Trail' of Evidence as Authorities Investigate California Mass ShootingQuestions arise how and when to subject technology and social media data to searches.
By Ed Silverstein
4 minute read
December 03, 2015 | Legaltech News
Survey: Cloud Privacy a Big Concern For Legal Departments'Generally, lawyers are the most conservative professionals when it comes to adoption of new technologies.'
By Ed Silverstein
4 minute read
December 03, 2015 | Legaltech News
Survey: Cloud Privacy a Big Concern For Legal Departments'Generally, lawyers are the most conservative professionals when it comes to adoption of new technologies.'
By Ed Silverstein
4 minute read
December 02, 2015 | Law.com
Emoticons, Emojis and E-Discovery, Oh My!With the explosion of social media and related trends, attorneys find themselves grappling with new methods of expressing emotion.
By Ed Silverstein
3 minute read
December 02, 2015 | Legaltech News
Emoticons, Emojis and E-Discovery, Oh My!With the explosion of social media and related trends, attorneys find themselves grappling with new methods of expressing emotion.
By Ed Silverstein
3 minute read
December 01, 2015 | Legaltech News
Experts Celebrate E-Discovery DayEvents promote e-discovery awareness and education.
By Ed Silverstein
4 minute read
December 01, 2015 | Legaltech News
Experts Celebrate E-Discovery DayEvents promote e-discovery awareness and education.
By Ed Silverstein
4 minute read
November 24, 2015 | Legaltech News
UK's Irwin Mitchell Deploys DarktraceThe Enterprise Immune System can detect anomalous behaviors across a network, and help spot cyber threats that may bypass more traditional security solutions.
By Ed Silverstein
2 minute read
Trending Stories