March 28, 2016 | Legaltech News
Opening a New Front: Ransomware Hits Mobile DevicesAlongside data “leakage” and operating system vulnerabilities, sophisticated ransomware attacks are became a top threat to mobile devices.
By Ricci Dipshan
5 minute read
March 25, 2016 | Legaltech News
Best of the Legal Tech Blogosphere: Cloud Standards, Stifling Legal's Ubers, and Big DataA roundup of blog posts and other musings from in and around the legal tech community.
By Ricci Dipshan
16 minute read
March 24, 2016 | Legaltech News
Seeing Hybrid Cloud Expand, Veritas Announces Google Cloud CompatibilityEven as public cloud services become more widespread, companies are still opting for hybrid storage solutions.
By Ricci Dipshan
8 minute read
March 23, 2016 | Legaltech News
3 Big Changes in Transatlantic Data Regulation under the Privacy ShieldThe publically released text reveals what areas of the new agreement will be most impactful, and perhaps most burdensome
By Ricci Dipshan
17 minute read
March 22, 2016 | Legaltech News
Enterprise Cloud App Use Growing, Running Towards Compliance, Security CollisionBy Ricci Dipshan
9 minute read
March 21, 2016 | Law.com
Rise in Shadow IT, Password Sales Disconnect with Employee Breach Concerns: SurveyEmployees' increasingly risky behavior at the office has led some to ask if data breaches are becoming a self-fulfilling prophecy.
By Ricci Dipshan
12 minute read
March 18, 2016 | Legaltech News
Best of the Legal Tech Blogosphere: Europe's Encryption Fight, Coding attorneys, and MoreA roundup of blog posts and other musings from in and around the legal tech community.
By Ricci Dipshan
17 minute read
March 17, 2016 | Legaltech News
Putting Ears to the Ground: The Rise and Challenges of Audio AnalyticsAudio data is being used more by regulatory agencies and in investigations, but has the technology caught up with the demand?
By Ricci Dipshan
12 minute read
March 17, 2016 | Legaltech News
Even for Companies that Don't Pay, Ransomware Attacks Prove Costly: SurveyEmployees are usually locked out for days after an attack, and often the cleanup process means the loss of essential files.
By Ricci Dipshan
5 minute read
March 16, 2016 | Legaltech News
Is Company Data Protected or in Peril? UK Management, Employees Can't AgreeThere is a wide disconnect between whether companies have formal BYOD policies in place, and whether they are doing enough to educate and train their employees in data protection policies.
By Ricci Dipshan
6 minute read
Trending Stories