EU Data Protection and Policy: Considering Artificial Intelligence
As AI gains strategic importance, it is essential to shape global rules for its development and use. In promoting the development and uptake of AI, the European Commission has opted…
Featured posts on the ComplexDiscovery blog designed to provide information and insight on cybersecurity areas of interest for data and legal discovery professionals.
As AI gains strategic importance, it is essential to shape global rules for its development and use. In promoting the development and uptake of AI, the European Commission has opted…
Want to understand the most valuable tech stats and trends? Legendary venture capitalist Mary Meeker has just released the 2019 version of her famous Internet Trends report. This year it…
It is challenging for existing digital evidence recording and storage technologies to outperform blockchain’s robust and secure offering. With this in mind, the Digital Forensics and Incident Response (DFIR) community…
Brave is an open-source, privacy-centered browser designed to block trackers and malware. It leverages blockchain technology to anonymously track user attention securely and rewards publishers accordingly. And it may change…
The role of the Chief Information Security Officer (CISO) is becoming the norm in eDiscovery companies as these companies grow their client base and venture into compliance and data breach…
A new group of Intel vulnerabilities, collectively called Microarchitecture Data Sampling (MDS), were disclosed last week. The vulnerabilities allow attackers to steal data as processes run on most machines using…
The BSA Framework for Secure Software tackles complex security challenges through an adaptable and outcome-focused approach that is risk-based, cost-effective, and repeatable. The Framework describes baseline security outcomes across the…
The work that Thomas Peyrin and his colleague, Gaetan Leurent, have done goes far beyond just proving SHA-1 chosen-prefix collision attacks are theoretically possible. They show that such attacks are…
When an acquirer does not protect itself against a data lemon and seek sufficient information about the target’s data privacy and security compliance, the acquirer may be left with a…
In 2017, global mobile devices and connections grew to 8.6 billion, and it is estimated that global mobile device traffic will reach almost one zettabyte annually by 2022. These mobile-centric…