The math: so if I receive 10 invites, one invite will be from an outfit whose cyber security technology cannot protect me? BY: Salvatore Nicci Technology Analyst / Reporter PROJECT COUNSEL [...]
Our Websites
THE POSSE LIST
This Posse List is a guide to the areas of litigation and the process of discovery — electronically stored information (ESI) and otherwise — and also provides information on jobs in those areas for our members and subscribers.
InfoTech Europe
Based in Paris with satellite offices in Brussels and Zurich, our primary work involves the staffing of e-discovery document reviews involved in European-based litigations and government investigations, as well as the related data collection, processing, analysis, and hosting functions.
From Our Blog
“Check out Microsoft’s average reaction time (to abuse reports). They’re the world’s best malware hoster for about a decade, due to O365.” BY: Salvatore Nicci Technology Analyst / Reporter [...]
A combination of machine learning with binary visualization to identify malware and phishing websites. Both processes involve patterns of color. BY: Salvatore Nicci Technology Analyst / [...]
Many companies would like to reduce their reliance on the spreadsheet application, but employees remain reluctant to give it up BY: Salvatore Nicci Technology Analyst / Reporter PROJECT COUNSEL [...]