data security

Inside the FTC: Data Security Battles and Hunt for Identity Thieves

Inside the FTC: Data Security Battles and Hunt for Identity Thieves 150 150 nextpointguest

Nextpoint’s Expert Witness is a feature offering insights from lawyers, technologists, law enforcement, entrepreneurs, and other interesting people influencing our industry and world. Check back regularly for thought-provoking expert opinions.   EXPERT WITNESS: Steve Wernikoff   Nextpoint recently spoke with Steve Wernikoff, attorney with the Federal Trade Commission in Chicago who specializes in consumer protection…

read more

Forget Defensible Deletion. Think Defensible Storage.

Forget Defensible Deletion. Think Defensible Storage. 150 150 Jason Krause

Defensible deletion is one of those topics lawyers have been hearing about a lot lately. Unfortunately, it’s also a subject that just means headaches for lawyers. Just this week, a poorly run deletion policy has had an enormous and possibly devastating affect on a major lawsuit. A Federal judge has hit Samsung with an adverse…

read more

Standing on the Shoulders of Cloud Computers

Standing on the Shoulders of Cloud Computers 150 150 Jason Krause

For science geeks, the real Fourth of July fireworks was the announcement that the Large Hadron Collider in Switzerland had found a particle likely to be the Higgs Boson, the last unobserved particle that completes the Standard Model in physics. The discovery is a massive achievement that is the culmination of centuries of research, insight,…

read more

Sensationalism and Cloud Computing

Sensationalism and Cloud Computing 150 150 aayers

By this point, I’m sure you’ve seen a lot of sensationalist news about cloud computing. That’s to be expected, as cloud computing represents a huge technological shift and will continue to demand a lot of attention. Yesterday, the Washington Post published this gem of an article based on a power outage that impacted one of…

read more

Bogus Questions Surrounding Cloud Data Storage

Bogus Questions Surrounding Cloud Data Storage 150 150 Jason Krause

In the abstract, the Internet and cloud applications are vaporous and hard to pin down. Data is not always stored in one location and does not follow a predefined route from one location to another. For lawyers, this makes cloud applications seem like a potential legal liability. If you don’t know where your data is…

read more

The Weakest Link in Data Security

The Weakest Link in Data Security 150 150 Jason Krause

As reported earlier this week, Verizon recently released a detailed analysis of hundreds of data breaches. One interesting statistic was that the amount of reported social engineering hacks- the polite way of saying “tricking people into giving you their password” – was down from last year. That’s misleading though, because social tactics remain the most…

read more