6 Key Takeaways from the SABA 2024 CLE Session on Cybersecurity for In-house Counsel
![](https://armortext.com/wp-content/uploads/2024/07/SABA-2024-Cybersecurity-Panel-1024x538.png)
ArmorText CEO Navroop Mitter shared insights alongside legal experts at SABA panel “We’re Under (Cyber)Attack! Interdisciplinary Best Practices for In-house Counsel.”
New: ‘Cyber Resilience: Incident Response Tabletop Exercises Q2 2024’
![](https://armortext.com/wp-content/uploads/2024/06/ArmorText_Crowell_Q2_2024_SocialTile-1024x535.jpg)
New and extremely sophisticated cyberattacks are taking organizations by surprise. Get the latest in our series of tabletops co-published with Crowell & Moring.
Digging Into Self-Identified Out-of-Band Communications in Industry Analyst’s Q2 2024 Report
![](https://armortext.com/wp-content/uploads/2024/04/Overwhelmed-Security-Architect-e1713967830443-1024x538.webp)
Regardless of how vendors self-identify, it’s important for organizations to consider what makes an out-of-band option truly appropriate for IR and SecOps comms
Announcing: ‘Cyber Resilience: Incident Response Tabletop Exercises 2023’
![](https://armortext.com/wp-content/uploads/2023/10/ArmorText-Crowell-Cyber-Resilience-2023-Cover_Top_Half-e1697338363910.png)
We collaborated with law firm Crowell & Moring to release ‘Cyber Resilience: Incident Response Tabletop Exercises 2023’ because like us they recognize that there is no better tool than preparedness. We believe making this guide publicly available to a wider audience is vastly more valuable than any short term monetary gain.
Guarding The Guardians: How Secure Comms Outwit Cyber Spies
![](https://armortext.com/wp-content/uploads/2023/07/AT-Guardians-1024x536.png)
Embracing the military ethos of staying ‘Left of Bang’ – a proactive rather than reactive approach to threats – is pivotal for Security Operations, DevSecOps, and Threat Intel Sharing communications. These areas are lucrative targets for threat actors intending to sustain or propagate attacks. This strategy entails implementing safeguarding measures not just in the aftermath of a breach, but before potential threats are realized.
Cybersecurity is a Shared Responsibility
![](https://armortext.com/wp-content/uploads/2023/06/Onus-1024x536.png)
In today’s interconnected world, the cybersecurity landscape is evolving at an unprecedented pace. Two major perspectives have emerged in the discourse, with one focusing on organizational accountability for cybersecurity and the other shifting the responsibility from customers to manufacturers. These viewpoints are not mutually exclusive, but rather, they form a composite picture of the cybersecurity reality we face today.
Why Wired’s Consumer Messaging Advice Doesn’t Cut It for Enterprises
![](https://armortext.com/wp-content/uploads/2023/06/Design-1024x536.png)
Recent advice on maintaining individual privacy from Wired simply doesn’t cut it for enterprises with legal, compliance, and regulatory concerns. Here’s how organizations can improve upon Wired’s recommendations.
Executive Awareness of Collaboration (In)Security is on the Rise
![](https://armortext.com/wp-content/uploads/2023/03/hackers-emails-1024x536.jpg)
94% of respondents in Mimecast’s The State of Email Security 2023 report agreed that Google Workspace and Microsoft O365 native security functionality just is not cutting it.
A New Era for E-Discovery: RSMF Support Added to ArmorText for Reviewers
![](https://armortext.com/wp-content/uploads/2023/06/RSMF-E-Discovery-1024x536.png)
With official support for the export of selected ranges of retained records by Reviewers within their Scopes-of-Review into the RSMF format, ArmorText is taking a significant step forward in the realm of e-Discovery. RSMF format allows for the seamless import and analysis of various types of digital communications for e-Discovery. This includes emails, chats, instant messages, SMS, MMS, and now ArmorText.
DoD’s Email Leaks Prove We Need Stronger Protocols Now More Than Ever
![](https://armortext.com/wp-content/uploads/2023/06/DoD-Email-Leak-1024x536.png)
An email server’s sensitive but unclassified contents, including emails pertaining to USSOCOM operations, were left exposed to anyone on the internet with the server’s IP address. It is time to adopt protocols built from the ground up with end-to-end encryption to protect sensitive collaboration and communications.