7 Steps for Law Firms to Combat Cyber Threats (SlideShare)

8 years ago

Malicious actors of all stripes recognize the value in attacking a law firm. Law firm security breaches are on the…

TiECON 2017 – Day 1 Reflections

8 years ago

It’s that time of year again where budding entrepreneurs, wide-eyed startups, angel investors, and venture capitalists all converge on the…

4 Steps to Avoid Discovery Overload

8 years ago

Overwhelmed with technology? Not sure how to start discovery? Conducting discovery should be easy. So, let's make it easy. These…

7 Steps Law Firms Have to Combat Cyber Threats

8 years ago

Protect the Client, Defend the Law Firm Your Law Firm is a Target If you think cases like the Panama…

An Open Letter to Congress: Net Neutrality Analogized

8 years ago

Hi Congress, Before providing a few analogies to simplify why net neutrality should exist, I want to tell you how…

No, (Insert Name) Is Not An eDiscovery Strategist

8 years ago

Who’s Your “Go-To”? Let’s be honest, we all have our favorite “go-to” person (or company) for many things. Whether it be…

LEGAL DISCOVERY: UNCOVERING THE UNKNOWN UNKNOWNS

9 years ago

Overview In 2002, Donald Rumsfeld, then acting US Secretary of Defense, spoke at a Department of Defense news briefing and…

CSI eDiscovery: Demystifying Physical Computer Collection

10 years ago

Originally posted on Cicayda.com: In the first article, CSI eDiscovery: The Fundamentals of Computer Forensics, we reviewed the growing world…

Startup DIY: 9 Steps to Startup Right

10 years ago

  Have an idea?  Are you looking for topics on how to start a business but aren't sure where to…

Look to the Future; Rely on the Past

10 years ago

I look to the stars at night sky with child-like wonderment thinking of what exists beyond as many a wild-eyed dreamer…