News / Events Nuix Blog Read up on Nuix thoughts, updates, and more Sort By:APIBig DataElasticsearchGDPRIGIndustry EventsMicrosoft 365Nuix Adaptive SecurityNuix CollectionsNuix CommunityNuix DiscoverNuix EndpointNuix Enterprise Collections CenterNuix EventsNuix InvestigateNuix UnscriptedNuix WorkstationNuixExchange2019OCRUser ExchangeWeb Review & AnalyticsWomenInNuixbrandcharitycompliance and threat preventioncustomer successcybersecuritydata lakedata modelsdata privacydata warehousededuplicationdiscoverediscoveryendpointenterpriseforensicsgoogleincident responseinformation governanceinnovationinsider threatintelligenceinvestigationslaw enforcementlaw firmslegalweeklegeltechlitigationmachine learningmobilenuixnuix partnersnuix softwarepodcastsprocessingringtailrisksecuritysecurity & intelligencethe nuix engineus governmentwebinarwebinarswomen in nuixworkflow We Are All Connected 23 Mar 20 With the COVID-19 global pandemic, we’re generating more human-generated data than ever. Video and audio conferencing are replacing in-person… Using Ten Dimensions of Data to Make Fact-based Decisions 19 Mar 20 No matter what kind of organization you work for or with, you’re challenged to make fact-based decisions every day. This holds as true for incident… Staying Connected with Nuix During the COVID-19 Crisis 18 Mar 20 The spread of COVID-19 has disrupted so many aspects of our “normal” lives. As governments around the world decree school closings, travel… Rock, Paper, Scissors, Knife, Gun, Elephant: Nuix Investigation Workflows Part 2 10 Mar 20 There are high profile examples of when the sheer volume of material that needed review during a criminal investigation led to mistakes happening. As… Images Are Everywhere: Nuix Investigation Workflows (Part 1) 04 Mar 20 One of the questions that I often get asked when speaking with customers around image review workflow—especially if they come from a law enforcement… Insider Threats: Not Just a Cybersecurity Issue 24 Feb 20 It’s interesting that the RSA 2020 conference, which begins today in San Francisco, has a theme of ‘The Human Element.’ Insider threats and… The Best Legal Customers Whittle All the Time 20 Feb 20 The art of whittling is underrated. Like whittling wood, data whittling is the process of chipping away at a large body—all data that could be… Six Crucial Questions for Real-time Data Readiness 06 Feb 20 The typical company has generated a bigger digital footprint in the last two years than in all its previous years of existence. In fact, 90% of all… Faces of Innovation and LegalWeek: What Will You Contribute? 30 Jan 20 How are knowledge management leaders and legal technology reinventing law firms and the practice of law? That’s been a burning question for the… Tracing the Path of Mobile Device Forensics 29 Jan 20 During a recent interview with Forensic Focus, I was asked about the early days of my career and involvement with high tech crimes working for the… Data Control: Myth or Reality 16 Jan 20 As unstructured content grows at a staggering rate, your organization’s knowledge and decision-making logic is being hampered by data that hasn’t… Balancing Privacy and Responsibility with Monitoring and Security 23 Dec 19 I’m going to start this article off by making an obvious literary reference, quoting George Orwell from 1984: “Big Brother is watching you.” It’s… Pagination First page « First Previous page ‹ Previous Page 1 Page 2 Page 3 Current page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Next page Next › Last page Last » Missing view, block "active_taxonomy_terms-----block_1"