Category: Blog

Chris talks Legal Tech with Lawyers Weekly

Chris talks Legal Tech with Lawyers Weekly From Lawyers Weekly: The CEO of a start-up specialsing in enterprise discovery shares the story of how his company has matured on the track to innovation to join the Nextlaw portfolio of companies endorsed by Dentons.Read the article

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats

Corporate Compliance Insights Guest Post

Corporate Compliance Insights Guest Post 3 Hidden Traps Associated With GDPR Avoiding the Challenges to Ensure Compliance From the Corporate Compliance Insights Blog:Many companies aren’t ready for the looming GDPR deadline, and they face real hurdles in getting to “compliant.” FileFacets, an enterprise analytics and privacy compliance platform that makes

Ransomware-as-a-Service Is Making Crime Easy

It shouldn’t surprise anybody to learn that cybercriminals are taking their lead from some established business service models. We wrote about Botnet distribution services here, and the concepts apply equally to other corners of the malware “industry.” In February 2016, the “Cerber” ransomware first appeared in the form of Ransomware-as-a-Service

Best Practices for Stopping Ransomware

With the recent return of Locky and continued growth of ransomware and ransomware-as-a-service, there is a good chance you personally know an individual or company that has experienced such an attack or another similar threat. If you work in the computer or security industry, you might also often be asked

What is PII? What Should We Do About It?

What is PII? What Should We Do About It? Dreams and fantasies are often referred to as “pie in the sky” thinking—nice to ponder, but, realistically speaking, not likely to happen. A generation ago we would have thought the digitization of info would usher in a Utopian paperless age when

New Cyren Threat Report: The Malware Wars

If you want to know what a cyber-war looks like, read the news. And if you want to get up to speed quickly and try to make sense of all that news, I recommend downloading our new special report on malware, with a special nod to the included interview of

Trickbot Banking Trojan Making Phishing More Real

Trickbot is back, new and improved, and was found targeting customers of Lloyds Bank of the UK last week in a renewed phishing campaign intended to steal online banking users’ security codes. The updated version of the malware, which first appeared last year, uses new techniques to make it even

What is a Botnet Attack? 6 Ways to Identify and Prevent It

  Botnets have become a trend in 2022 and will likely continue to be a threat in 2023. According to Spamhaus’s Q4 2021 Botnet Threat Update, they reported there was a 23% increase in botnet C&C attacks from Q3 to Q4 in 2021. Additionally, there were 300,000 instances of Emotet