article thumbnail

Observations about Legaltech 2020 from Attendees: eDiscovery Trends

eDiscovery Daily

So, what did attendees at the conference think about this year’s show? As always, these should be taken as their personal opinions and observations regarding the show, not those of their employer or clients. “Despite everything I had heard about the annual conference, I wasn’t sure what to expect from my first Legaltech NY.

article thumbnail

Note to Self: Create Non-Exhaustive List of Competitors

Krebs on Security

Mine was learning that KrebsOnSecurity is listed as a restricted competitor by Gartner Inc. Nor have I ever offered paid consulting or custom market research (although I did give a paid keynote speech at Gartner’s 2015 conference in Orlando , which is still by far the largest crowd I’ve ever addressed).

Marketing 219
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends. Cyber trends and threats that we identified in the world are likely to occur in Asia. Increasingly often, state-sponsored hackers are focusing on vulnerabilities in home routers.

article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

Cyberattacks are on the rise, with cyber criminal trends and techniques becoming increasingly sophisticated and creative. Ransomware is the fastest-growing trend. Some top EDR tools are Crowdstrike Falcon, SentinelOne, Trend Micro, Microsoft Defender for Endpoints, Symantec, Bitdefender, Cynet, Palo Alto Cortex XDR, and Trellix.

article thumbnail

RSAC insights: How IABs — initial access brokers — help sustain, accelerate the ransomware plague

The Last Watchdog

I had the chance at RSA Conference 2022 to visit with John Shier, senior security advisor at Sophos, a security software and hardware company. an operative who’s adept at, say, carrying out a crypto mining routine that saps processing power. Or the payload might be a data exfiltration routine — or a full-blown ransomware attack.

Access 235
article thumbnail

Thursday LTNY 2020 Sessions: eDiscovery Trends

eDiscovery Daily

year in a row, eDiscovery Daily is here to report about the latest eDiscovery trends being discussed at the show. I’ve opened them all up, so you don’t have to. : o ) Sessions in the main conference tracks include: 9:00am – 10:00am: Cite Early! Cite Often! The 2019-2020 Cases That Every Practitioner Should Know.

article thumbnail

Jisc Futurist Q&A ? and 25 per cent off ILI Conference 2018

CILIP

Martin Hamilton is Jisc's resident Futurist and will be a keynote at this year's ILI Conference 18 ? technological and societal trends often creep up on us unnoticed, but then with hindsight it?s These are both quite pernicious trends. ll be speaking about all of this at the Internet Librarian conference in October.