article thumbnail

Trust Under Siege: The Aflac Breach and the Insurance Sector’s Cyber Dilemma

Complex Discovery

For professionals in cybersecurity, information governance, and eDiscovery, this incident underscores the urgent need to reassess threat detection, third-party oversight, and adaptive defense strategies.

article thumbnail

The Quiet Force Behind Successful Outcomes: Pretrial Motions

Joseph, Hollander & Craft

Motion to Compel or for Discovery Sanctions: A motion to compel, most commonly used in family law and other civil cases, is used to force a party to provide responses to the opposing party’s discovery requests. A related motion is one for discovery sanctions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine’s Cyber Strike on Gazprom: When Digital Warfare Hits Energy Infrastructure

Complex Discovery

It follows other recent Ukrainian cyber offensives targeting drone manufacturers and Russian financial institutions—further evidence of the growing role cyber capabilities play in national defense strategies.

article thumbnail

CAFC Reverses Contempt Finding for Disclosures of Confidential Discovery Information to Develop Joint Defense Strategy

IP Watchdog

Circuit Judge Jimmie Reyna authored a brief dissent from the majority opinion, arguing that Leader’s disclosure of certain confidential information with another company sued by Static for the development of a joint defense strategy was a violation of the district court’s protective order.

article thumbnail

Coinbase Battles SEC Over Access to Gary Gensler’s Private Communications

Complex Discovery

The crux of the dispute centers on Coinbase’s request for access to private communications from SEC Chair Gary Gensler, which the company deems essential to its defense strategy. Grewal characterized their pursuit as a quest for “reasonable discovery” in response to the SEC’s June 2023 lawsuit.

article thumbnail

Experts Call for ‘NATO-Like’ Cyber Defense Against Chinese Hacking

Complex Discovery

Editor’s Note: This concise article offers cybersecurity, information governance, and eDiscovery professionals a valuable snapshot of the current cyber threat landscape, particularly concerning China. It efficiently highlights key strategic insights, regulatory considerations, and technological trends crucial for these professionals.

article thumbnail

RockYou2024 Leak: Nearly 10 Billion Passwords Exposed, Heightening Cybersecurity Risks for Businesses

Complex Discovery

The cybersecurity community continues to emphasize the importance of vigilance and robust defensive strategies in light of this alarming discovery. Password managers, which can generate and store complex passwords securely, and identity theft protection services are indispensable tools in the fight against cybercrime.