Remove Computer and Electronics Remove Education Remove Examples Remove Webinar
article thumbnail

Global Data Breaches and Cyber Attacks in April 2024 – 5,336,840,757 Records Breached

IT Governance

1 Example: Le Slip Français – initially logged as unknown, although we knew that the threat actor claimed to have more than 1.5 2 Example: Argentinian database of driving licences – sample of 70,000 licences, so we logged this as 70,000 records, but the full database allegedly contains 5.7 million licences/records.

article thumbnail

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Three

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. To begin to answer that question, let’s take a look at the ethical obligation that lawyers have to be technically competent and the state of technology education for lawyers today. How Can We Change the Situation?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding Blockchain and its Impact on Legal Technology, Part Four

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. Several actual examples may show the actual utility of blockchain. Thus, it doesn’t have centralized points of vulnerability that computer hackers traditionally exploit. General Use Cases for Blockchain.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great. The first is forensic images of computers and cell phones.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Two: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. Again, Ralph Losey provides a good example. (I’m I’m not trying to pick on Ralph, he is just such a prolific writer that his examples are everywhere…and deservedly so). In short, analytics are the individual tools.

article thumbnail

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Three

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. In the book we wrote as a follow up to our ABA TechShow session (Electronic Discovery for Small Cases (ABA, 2012), Bruce Olson and I listed several, including: Acrobat Legal Edition: adobe.com.

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

In this webinar Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, and Joanna Huisman, KnowBe4's Senior Vice President of Strategic Insights and Research, review our 2023 Phishing By Industry Benchmarking Study findings and best practices. Watch this webinar to find out and earn CPE credit for attending! We looked at 12.5