article thumbnail

Welcome to Legaltech New York 2020!: eDiscovery Trends

eDiscovery Daily

In addition to that, today and tomorrow, CloudNine will conduct its second annual NineForum Discovery Education Series where prominent and highly respected eDiscovery and litigation support experts will deliver 9 TED-style talks, 20 minutes each, covering important topics impacting the legal community. The future of BlockTech in law.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Four: eDiscovery Best Practices

eDiscovery Daily

I’ll leave aside the issue of accuracy for another day since two of the most interesting case studies, the EDI/Oracle study and the most recent Lex Geek “study” in which a human SME scored exactly the same number of accurate retrievals as the computer system. In addition, the lack of definitions makes pricing problematic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

User education is one of the most powerful tools for preventing malicious mobile apps. While this case study is just a snapshot, vigilance in the app store is required. Also, organizations should educate users about the threat as rogue security software attackers have become particularly good at social engineering.

Phishing 102
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

My healthcare is always going to be one again, it's a vertical healthcare and education, both where you have large amounts of very sensitive information, but not necessarily the budgets to secure it effectively. It's almost like we're doing a global global economics case study as to what happens and how it happens.

article thumbnail

Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law

eDiscovery Daily

ESI Discovery Procedures , includes definitions and specifications for image load file formats, production of hard copy documents and production of ESI (including things like handling of exceptions, production of metadata, handling of duplicates, handling of parent-child relationships, format of Bates numbers and handling of third-party subpoenas).

article thumbnail

THE MOTIVATION AND DESIGN BEHIND AUTOGENERATED CHALLENGES

ForAllSecure

While you can't automate away the placement of subtle bugs and clever tricks, we can definitely add meaningful sources of variance to challenges without much additional effort, with the added bonus that challenges are easier to deploy. CASE STUDY: VARIABLE LENGTH BUFFERS AND CANARIES. DEFINING CHALLENGE SPECIFICATIONS.

article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

While you can't automate away the placement of subtle bugs and clever tricks, we can definitely add meaningful sources of variance to challenges without much additional effort, with the added bonus that challenges are easier to deploy. Case Study: Variable Length Buffers And Canaries. Defining Challenge Specifications.