E-Discovery

My friend Judy Greenwald at BusinessInsurance.com reported a Cornerstone Research report entitled “SEC Cryptocurrency Enforcement” that the “…U.S. Securities and Exchange Commission has brought 75 enforcement actions and 19 trading suspension orders against cryptocurrency participants between its first in July 2013 and the end of 2020.” The May 11, 2021 entitled “SEC has brought 75 cryptocurrency enforcement actions: Report” included these comments: Of the 75 enforcement actions, 43 were litigated in U.S. district courts and 32 resolved as administrative proceedings within the SEC, according to the report. Eighty-one percent of the litigated cases involved an allegedly…
McKinsey.com reported that “To make SaaS, serverless, and open source work for new businesses, incumbent companies must completely rethink their IT strategy, redesign processes, embed new approaches and mindsets, redesign security, and attract a new type of talent. The benefits of serverless in reduced time to market alone, for example, more than outweigh the challenges of making the transition. Leaders who can manage these five tasks in tandem will gain the organizational capabilities to better support business building and jump-start growth.”  The April 28, 2021 article entitled “SaaS, open source, and serverless: A winning combination to build and scale
Darkreading.com asked this question “How can SaaS vendors demonstrate proof of their commitment to taking their customers’ data security seriously?” because a “…2020 survey found that 52% of companies were using cloud services that had experienced a breach involving user data.”  The April 23, 2021 report title “SOC 2 Attestation Tips for SaaS Companies” answered its question with these comments: One way SaaS vendors can demonstrate this is by achieving attestation with SOC 2. According to the Association of International Certified Professional Accountants (AICPA), SOC 2 is a means for SaaS vendors and other organizations to obtain reports…
Darkreading.com reported these comments from Sandeep Chandana (director at McAfee’s MVISION Cloud group) that “…a large portion of the cloud attacks in Q4 were targeted at Microsoft Office 365 accounts. The attacks could be classified as either distributed login attacks on hundreds or thousands of Office 365 accounts via compromised consumer devices, or targeted attacks on a small number of potentially high-value accounts.”  The April 15, 2021 report entitled “Malicious PowerShell Use, Attacks on Office 365 Accounts Surged in Q4” included these comments: PowerShell threats grew 208%; Microsoft Office malware increased by 199%, while malware targeting mobile devices…
There are an estimated 35+ billion IoT devices at the beginning in 2021 and HelpNetSecurity.com reported that “99% of security professionals report challenges with the security of their IoT and IIoT devices, and 95% are concerned about risks associated with these connected devices.” The April 6, 2021 report entitled “99% of security pros concerned about their IoT and IIoT security” included these comments from Tim Erlin (VP of product management and strategy at Tripwire): The industrial sector is facing a new set of challenges when it comes to securing a converged IT-OT environment,… In the past, cybersecurity was…
HelpNetSecurity.com reported that “Enterprises are embracing multi-cloud architecture to prevent data loss or downtime due to a localized component failure, ensure security compliances, and meet workload requirements. The demand for the deployment of 4G/5G networks globally is also expected to increase during the forecast period.”  The March 29, 2021 report entitled “Data center market size to reach $519.34 billion by 2025” included these comments: The data center market is expected to post a year-over-year growth rate of 18.30%. The data center IT infrastructure segment includes server infrastructure, storage infrastructure, SDDC, network infrastructure, converged infrastructure, backup and recovery software,…
HelpNetSecurity.com reported the comments from John Buzzard (Lead Analyst, Fraud & Security, with Javelin Strategy & Research) “The pandemic inspired a major shift in how criminals approach fraud,…Identity fraud has evolved and now reflects the lengths criminals will take to directly target consumers in order to steal their personally identifiable information.”  The March 24, 2021 article entitled “Total combined fraud losses climbed to $56 billion in 2020” included these comments: The global pandemic has had a dramatic impact on consumer financial behavior. Consumers spent more time at home in 2020, transacted less than in previous years, and relied…
Computerworld.com reported that “We were using email in the 1970s, and we’ll still be using it in the 2070s.”  The March 17, 2021 article entitled “Email is for yesterday, today, and tomorrow” included these comments: People are still telling me that email is obsolete, that it can be replaced by SlackTeams, or Google Chat. Some folks swear they can do more over instant messaging.  Or, even better, some proclaim (with an odd glare in their eyes from their webcam ring light), ZoomGoogle Hangouts Meet, or BlueJean Meetings are the future. Email’s…
DarkReading.com reported about the Kaspersky “IT security economics part 4: managing your IT security team” that “52% of enterprises have a dedicated IT Security department while some further diversified the workforce – 20% have an internal security operations center and 14% employ a special malware analysis team.”  The March 9, 2021 report entitled “48% of Security Pros Prohibited From Intelligence-Sharing” included these key findings: High workloads (41% overall and 46% in IT security roles) is the primary reason given for leaving a department 69% of businesses are planning to use MSPs and MSSPs in the next…
HelpNetSecurity.com reported that about a study which “…highlighted major concerns for the virtual workforce, with 52% of respondents stating that identity-specific threats are keeping them up at night. For a workforce that is both remote and distributed, decision-makers expressed concern over malicious actors impersonating employees, alongside instances of inappropriate access to sensitive information.” The March 9, 2021 article entitled “A great deal of employees have inappropriate access to sensitive data” included these details: The study highlighted major concerns for the virtual workforce, with 52% of respondents stating that identity-specific threats are keeping them up at night. For a…