May 04, 2016 | Legaltech News
Uptime Legal Acquires Jurispage to Help Firms with Online Presence, Digital BrandingWith the acquisition, the company focuses on helping firms grow their practice while providing them with easy access to legal tech through their cloud platform.
By Ricci Dipshan
6 minute read
May 03, 2016 | Legaltech News
From Theory to Application: Blockchain Tools Start to Hit the MarketWith Deloitte developing 20 blockchain prototypes to a startup offering organizations the ability to create their own blockchain apps, cryptographic hashing is becoming a tech reality.
By Ricci Dipshan
7 minute read
May 02, 2016 | Legaltech News
CLOC and LTC4 Partner to Push Legal Technology Core Competency StandardsBy Ricci Dipshan
5 minute read
April 29, 2016 | Legaltech News
A Big Data Processing Breakthrough? Startup Levyx Seeks a Revolution of Cost, SpeedThe startup, which recently closed on $5.4 million in series A funding from investors, hopes to tackle big data challenges by using modern drive technology and flash memory.
By Ricci Dipshan
4 minute read
April 29, 2016 | Law.com
Into the Deluge: The Evolution of Cyberthreats to Law FirmsThe evolution of cyberthreats has left law firms struggling to shore up defenses against breaches, extortion and employee targeting.
By Ricci Dipshan
9 minute read
April 29, 2016 | Legaltech News
Best of the Legal Tech Blogosphere: Updating Digital Communication Law, Fighting Patent Trolls, and MoreA roundup of blog posts and other musings from in and around the legal tech community.
By Ricci Dipshan
25 minute read
April 28, 2016 | Law.com
Regulators, Companies Turn to Forensics Data Analysis to Uncover Big Data, Insider ThreatsAn discussion with EY experts sheds light on how technology is being advanced in the regulatory field — and how it will always fall short if not properly used with human judgement and knowledge.
By Ricci Dipshan
11 minute read
April 27, 2016 | Law.com
Through Human and Conventional Openings, Successful Breaches Happening at Dizzying SpeedsHackers and cybercriminals are posing as employees to access company systems and finding success exploiting in traditional weak spots
By Ricci Dipshan
12 minute read
April 26, 2016 | Legaltech News
Nefarious Emails, Novel Malware, and Negligence: The Growth of the Insider ThreatThe 2016 Global Threat Report finds companies' biggest vulnerability is usually its own staff, with cybercriminals hitting this weakness with increasing sophistication.
By Ricci Dipshan
10 minute read
April 25, 2016 | Legaltech News
With Unstructured Data, Information Governance Hits a Blindspot: SurveyDespite companies' awareness of the importance of IG programs, many lack the insight and control over much of their employee-produced data.
By Ricci Dipshan
7 minute read
Trending Stories