Securing the Unstructured Castle: Protecting Your “Dark Data”

Securing the Unstructured Castle: Protecting ...

Up next

The Smartest Person in the Room? The One Who Asks and Learns

Guest June Hunter is a trained paralegal professional and legal technology trainer with a 35-year career in legal services that spans the profession’s growth from the days of physical, paper files to today’s legal tech AI revolution. Hear how Hunter has come to feel that paralega ...  Show more

The Art of Case Budgeting

The process of “case budgeting” is increasingly common in complex litigation, it’s the science and art of laying out the potential time and cost of trying a case. Daniel Dowd is the managing partner and the president of the Phoenix law firm Cohen Dowd Quigley. He explains how to ...  Show more

Recommended Episodes

117: Daniel the Paladin
Darknet Diaries

Daniel Kelley ( https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness.


Sponsors

Support for this show comes from Keeper Security. Keeper Security’s is a ...

  Show more

111: ZeuS
Darknet Diaries

ZeuS is a banking trojan. Designed to steal money from online bank user’s accounts. This trojan became so big, that it resulted in one of the biggest FBI operations ever.


Sponsors

Support for this show comes from Axonius. Securing assets — whether manage ...

  Show more

138: The Mimics of Punjab
Darknet Diaries

This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy.


To learn more about ...

  Show more

#171 Data Security in the Age of AI with Bart Vandekerckhove, Co-founder at Raito
DataFramed

Data used to be the exhaust of our work activities, until we started seeing the value it can provide. Today, data is a strategic asset, used to gain a competitive advantage and well guarded from those that might use it to harm others. With this change in attitude, how we access a ...  Show more