eDiscovery Professionals 2018 BOLO

With LegalTech (or should I say LegalWeek) approaching in the next few weeks, I’ve read a bunch of articles/blogs lately about legal technology trends to be on the lookout (BOLO) for in 2018.  Most, if not all, of these musings have been centered on law firm and in-house counsel usage and the tech they need […]

January 19, 2018 | Caragh Landry

Let’s Stop Calling AI, AI

I was asked this week what my least favorite eDiscovery buzzword was and without hesitation I responded “AI”.  AI, as in, artificial intelligence, is one of those terms that makes me cringe whenever I hear it spoken in terms of the legal industry. Supervised and unsupervised machine learning, in my life, are very common tools.  […]

January 11, 2018 | Caragh Landry

Document Review as a Career

This should come as no surprise to anyone, but very few people go to law school thinking they will wind up doing document review for a living.  Document review as a career itself is still somewhat new, but I think some attorneys have found a good fit working for alternative legal services providers, first as […]

January 4, 2018 | Caragh Landry

Part 4: A Timeline of Ransomware Advances

Ransomware, the malicious code that holds so much data captive, is now more commonplace than data breaches.  It continues to be a thorn in the side of companies large and small, and it has enriched many cyber criminals in the course of its history.  It targets computers, mobile devices, and even IoT. The ransomware we […]

December 27, 2017 | Eric Vanderburg

GDPR: What’s New, What’s Different

The new General Data Protection Regulation (GDPR) is now less than five months from going into effect and still, I’m not sure we all know what exactly that means.  As of May 25th, the current EU Data Directive, as well as the directives in all EU member states, will be replaced by this new regulation […]

December 21, 2017 | Caragh Landry

Part 3: The 6 Phases of an Advanced Ransomware Threat

The vast majority of ransomware attacks target a region or demographic, but there are some that are strategically selected to do the most damage and make the largest profit.  Extortionists go through great effort to penetrate a business, and the ransom demands for these Advanced Ransomware Threats (ARTs) far exceed those for a typical attack. […]

December 20, 2017 | Eric Vanderburg

TAR – How not IF

Technology Assisted Review, or TAR as it’s more widely known, is a confusing topic for anyone in the eDiscovery world, but I fear that it’s most confusing for those at the law firm or in-house counsel office who are trying to explain it to the court, opposing counsel or to their own teams. What is […]

December 14, 2017 | Caragh Landry

Part 2: The Psychology Behind Infamous Ransomware

Cybercrime is very much a psychological game and ransomware is no different.  Psychology plays a role in almost all aspects of an attack from determining whether phishing messages effectively grab the attention of target users to whether victims pay the ransom. Psychology of ransomware distribution A majority of ransomware is distributed through phishing emails, instant […]

December 13, 2017 | Eric Vanderburg

Part 1: The Economics of Ransomware

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist with ransomware is that the basic rules of supply and demand become a little hard to follow. Typically you have a buyer and a seller. In this case, the distributor—or supplier—have to steal what’s in […]

December 6, 2017 | Eric Vanderburg

The Lonely Castle: Insights into the Evolution of Cybersecurity Defense

This technological era is one that changes rapidly and so do defense strategies.  In the ancient world, combat strategies might have stayed the same for generations, but today the strategies of attackers and defenders evolve at an ever-increasing pace. The castle approach was used a decade ago.  Information systems were walled up behind castle fortifications, […]

November 29, 2017 | Eric Vanderburg

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology