With many companies increasingly allowing – and in many cases encouraging – the use of personal devices for work-related matters, a recent CCBJ webinar highlighted the importance of implementing a Bring Your Own Device (BYOD) policy.
Continue Reading E-Discovery Challenges of BYOD Programs
AccessData
Now That Your Data’s in the Cloud, How Do You Get It Out?
Data migration has reached a tipping point. The vast majority of technology decision-makers (84 percent) say that their organization invested in cloud services in 2016, according to Insight’s 2017 Intelligent Technology Index report. It noted that “while only 15 percent have fully migrated their corporate application workloads to public clouds, 47 percent are more than halfway implemented in the cloud, with large and medium companies leading the way.”
Continue Reading Now That Your Data’s in the Cloud, How Do You Get It Out?
For Internal Investigations, Technology is Playing Catch-up with Technology: Companies focus on hackers and data, and sometimes overlook inside threats
Interview with Scott Lefton/AccessData
Scott Lefton is a senior sales engineer at AccessData. Though he is not directly involved in conducting or supervising investigations, he spends a lot of time talking to the people who do, including chief security officers, people in HR and, of course, in-house lawyers. He listens to their “woes,” he said, and suggests software designed to help them. His remarks have been edited for length and style. Continue Reading For Internal Investigations, Technology is Playing Catch-up with Technology: Companies focus on hackers and data, and sometimes overlook inside threats