article thumbnail

Four Times Self-Collection Went Wrong

eDiscovery Daily

Judge Matthewman granted the defendants a second chance but required both parties to collaborate in a robust meet and confer. Only one employee oversaw the collection process, and he described himself in court as “computer illiterate.” To learn more information or request a demo, visit: [link]. [1] 1] Gretchen E.

article thumbnail

Highlights from DefCon 2018

Thales Cloud Protection & Licensing

We attended the show with our colleague Paul Cleary and sat in on many talks (and demos) ranging from attacking IoT devices over insecure Bluetooth connections, to exploiting publically available expired certificates. Are You a Good or Bad Hacker? The presenters collected over 300 million public keys from across the internet (X.509,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Building the Relationship Between RM and IT

The Texas Record

Whether it’s creating and securing electronic records or establishing a process to capture records from social media sites, records managers often find themselves working closely with their Information Technology (IT) Departments. We would also invite them to RM conferences. This helped both teams to better communicate.

IT 60
article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

CBS: A computer security researcher was kept off a plane for suggesting on social media that he could hack into the planes control system. Vamosi: Now, before we get too far, one might ask, if you’re going to go through the effort to create a village, why not create a whole conference around the topic of aerospace instead?

article thumbnail

Generate More Revenue For Your Law Firm with Modern eDiscovery

eDiscovery Daily

Electronically stored information (ESI) evolves every time new software is created. However, law firms and forensics companies in particular now understand the true value of other modern data like computer activity, geolocation, and financial transactions because it’s critically important to the success of their investigations.