August 18, 2014 Sean Martin Articles, Featured Article, Conference Coverage The Making of a Cybercrime Market August 18, 2014 Sean Martin Articles, Featured Article, Conference Coverage Two underground entities surfaced, battled, aligned, and ultimately extracted billions.
April 15, 2014 imsmartinelli Articles Who Will Pay the Price When Tragedy Strikes the IoT? April 15, 2014 imsmartinelli Articles The Internet of Things (IoT) is not, by itself, resilient to cybercrime or immune from exploitation.
November 14, 2012 imsmartinelli Articles Top Mobile Use Cases in Law Firms November 14, 2012 imsmartinelli Articles This article on Law.com (US) provides insight into the use cases and some of the mobile app players delivering the goods which enable the use cases.
November 8, 2012 imsmartinelli Articles, Conference Coverage There's an App or Law Firms November 8, 2012 imsmartinelli Articles, Conference Coverage The catchphrase for the mobile lawyer? “There’s an app for that.”
October 17, 2012 imsmartinelli Articles Managing Mobile Risk - Avoiding Information Governance Mine Fields October 17, 2012 imsmartinelli Articles Despite the challenges, legal organizations can rein in the information governance risks with common sense and the latest technologies.
October 2, 2012 imsmartinelli Articles, Featured Article In Security Response, Practice Makes Perfect October 2, 2012 imsmartinelli Articles, Featured Article We’ve heard it many times in many forms — expect to be breached, expect that you’ve been breached...
September 24, 2012 imsmartinelli Articles Will Next-Generation Firewalls Nix Stand-Alone IPS? September 24, 2012 imsmartinelli Articles Firewall vendors are in the business of providing network security, and as network security challenges evolve, so must firewalls.
August 21, 2012 imsmartinelli Articles, Featured Article Do Technology Change Agents Make e-Discovery Better or Worse? August 21, 2012 imsmartinelli Articles, Featured Article Change agents in technology are changing how we do business, communicate, and how we approach e-discovery.
July 16, 2012 imsmartinelli Articles, Featured Article Open Source Offense Could Be Our Best Defense Against Cyberattacks July 16, 2012 imsmartinelli Articles, Featured Article How to properly protect the organizations’ information systems and assets given security tools often seem like a black hole.
July 9, 2012 imsmartinelli Articles, Featured Article BYOD Is A User-Driven Movement, Not A Secure Mobile Device Strategy July 9, 2012 imsmartinelli Articles, Featured Article The bring your own device (BYOD) movement, the trend of people using their own mobile devices to access corporate resources is unstoppable.