

Field Notes: Leveraging IoT Data Isn’t a Budget Killer
Like many, I attended LegalTech Jan. 31 – Feb. 2 and enjoyed catching up with old friends while seeing new, emerging technologies. Did you see the car forensics kit being offered by Berla? That was pretty cool and something I am definitely going to keep an eye on. One of the things I always enjoy is the post-LegalTech articles. Everyone talking about what they saw, what caught their eye, and where they think the legal technology world is heading. I was really looking this yea


The Ethical Hacker: I Got 99 Problems, But No Data Ain’t One
A few weeks ago, I was lucky enough to meet with some senior in-house counsel from a Fortune 10 company. We were discussing data and the powerful ways analytics can be used in litigation. One of the attorneys appeared somewhat dismayed, saying that while analytics are amazing and she really wanted to make use of the technology, rarely did any of her cases contain anything other than emails and documents. One of her colleagues asked, “Aren’t you working on the <XYZ> matter?” S


The Ethical Hacker: Are You Accounting for One of Your Largest Cybersecurity Risks?
I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams to help assess and control this cyberrisk. (At least I hope you are.) And one of the first things most security professionals recommend is taking an inventory of your IT assets. In fact, it’s embodied in the fi


Field Notes: Employee Departures
It’s Friday afternoon and the conversation goes a little like this, “Wait, what? They’re leaving? Where are they going? Is there any opportunity to help them reconsider?” When a key employee departs an organization, it can take a toll on clients and colleagues, productivity and morale. What follows is a rush of activity: current projects are reviewed, transition plans are quickly drawn up and put in place, and decisions are made about how to replace the departing employee


Field Notes: Shadow IT
The Cloud is everywhere we turn these days. If you haven’t seen or read an article in the last year about what it is, why you should move to it, why you shouldn’t move to it, how everyone else is moving to it, or other key, critical advice about it, then you haven’t been paying attention. I’m even guilty of it myself, having co-written with my colleague, Brandon Leatha, a piece about what to consider when migrating to the Cloud (Legal Considerations when Adopting Cloud Tech


Field Notes: How to Protect Yourself from Ransomware Attacks
Ransomware. Just the word itself is enough to chill the hearts of everyone from personal users to corporate IT and senior executives. May 12th’s massive attack took down hundreds, perhaps thousands, of companies and unknown numbers of individuals, including the United Kingdom’s healthcare systems with possible impacts including critical patient care and historical medical records. At iDS, we’ve helped companies recover from ransomware attacks. In some cases their policies a