As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Charlie Platt, a director at iDiscovery Solutions and a Certified Ethical Hacker. He advises clients on data analytics, digital forensics, and cybersecurity.
These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention.
Acronyms and geek-speak abound, and we are ever on the lookout for the next latest and greatest technical solution to secure our digital assets. Unfortunately, that perfect technical solution doesn’t exist and never will. How can I be so sure? Because no matter how well built, or how well thought out our technical solution may be, humans are involved. When humans are involved, they will be the weakest link, and we can’t (yet) re-engineer humans with a technical solution.
Continue Reading Technically Speaking, Cybersecurity Isn’t About Speaking Technically
In a series of breakfast briefings, Seyfarth attorneys Robert Milligan, Joshua Salinas, and Scott Atkinson, joined by Jim Vaughn, one of California’s leading computer forensic experts, discussed how to navigate the tricky waters and provided best practices for trade secret protection. The briefings covered how to best identify and protect trade secrets, what employers need to know about the DTSA,
As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Charlie Platt, a director at iDiscovery Solutions and a Certified Ethical Hacker. He advises clients on data analytics, digital forensics, and cybersecurity.
In a
“I’m from the government and I’m here to help.” Yeah, right.
Seyfarth Shaw, AlixPartners, and Directors Roundtable invite you to attend
Do you and your firm have adequate cybersecurity to prevent yourself (and your confidential client data) from getting hacked?

