Blog Archives

Exploring AI in Data Governance and Incident Response

 |  posted on June 27th, 2024 by iCONECT Marketing  |  read more

Exploring AI in Data Governance and Incident Response An in-depth look moderated by InfoTech’s Advisory Director Thomas Randall In this thought-provoking discussion with Emily Johnston (Cyber Data Mining Product Director), Jonathan Younie (Data Governance Product Director), and Ian Campbell (iCONECT Founder and CM), covers Artificial Intelligence (AI) real-world applications for incident response, data governance, and   …Continue Reading

The Essential Need for Purpose-Built Software in Incident Response Review

 |  posted on June 7th, 2024 by Emily Johnston  |  read more

The Essential Need for Purpose-Built Software in Incident Response Review In the evolving landscape of cybersecurity, the need for specialized tools tailored to the unique challenges of incident response has never been greater. As a company deeply embedded both the data mining and e-discovery realms, we at iCONECT understand the distinct requirements and complexities that   …Continue Reading

Adapting Legal Tech to Meet Tomorrow’s Challenges: A Conversation with Industry Leaders

 |  posted on April 26th, 2024 by Emily Johnston  |  read more

Adapting Legal Tech to Meet Tomorrow’s Challenges: A Conversation with Industry Leaders The landscape of legal and professional services is constantly transforming, fueled by rapid technological advancements and shifting market demands. On a compelling episode of “Reinventing Professionals,” industry analyst Ari Kaplan explored these changes with Emily Johnston, Product Manager for Cyber Data Mining, and   …Continue Reading

FAQ: COVER Powered by iCONECT | Mass Action Redaction

 |  posted on April 12th, 2024 by iCONECT  |  read more

FAQ: COVER Powered by iCONECT | Mass Action Redaction In today’s blog, we’re highlighting the mass action redaction feature in iCONECT, powered by our PII and PHI redaction tool, COVER. Follow along as we explore how this feature can enhance data protection strategies for organizations. Q: What is COVER Powered by iCONECT? A: COVER Powered   …Continue Reading

7 Steps to Seamless eDiscovery, Data Governance, and Data Breach Protection

 |  posted on March 15th, 2024 by Ian Campbell  |  read more

 7 Steps to Seamless eDiscovery, Data Governance, and Data Breach Protection Welcome to iCONECT’s product matrix of solutions for efficient document management, where the complexities of eDiscovery, data governance, and safeguarding against data breaches are seamlessly handled. In this blog post, we cover the iCONECT approach in seven steps. Use this to guide your review   …Continue Reading

The Tangled Web of Cyber Data Mining: A Practitioner’s Perspective

 |  posted on January 26th, 2024 by Emily Johnston  |  read more

The Tangled Web of Cyber Data Mining: A Practitioner’s Perspective  As someone who has spearheaded hundreds of cyber data mining projects, I’ve navigated the complex maze of extracting personal identifiable information (PII) from unstructured data in order to provide notification lists to affected end clients, who are simultaneously facing unprecedented IT and business interruption issues.   …Continue Reading

Data Storage Dilemma: Unveiling Your Preferred Solution in Our Exclusive Poll!

 |  posted on January 19th, 2024 by iCONECT Marketing  |  read more

Data Storage Dilemma: Unveiling Your Preferred Solution in Our Exclusive Poll! In the ever-evolving landscape of digital information management, the choice of data storage is a critical decision for individuals and organizations alike. The diverse options, ranging from cloud-based solutions offering flexibility and accessibility to on-premise servers providing control and security, present a conundrum. Striking   …Continue Reading