Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance
WATERLOO, ONTARIO and EDEN PRAIRIE, MINNESOTA – December 16, 2024 – Arctic Wolf® and BlackBerry Limited (NYSE: BB; TSX:BB), two global leaders in security software and services, today announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance® endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of organizations around the world. With this acquisition, Arctic Wolf ushers in a new era of simplicity, flexibility, and outcomes to the endpoint security market, delivering the security operations results customers have been asking for.
Understanding the Anatomy of a Breach and How to Protect Your Firm
Join Cornerstone.IT & Arctic Wolf, ILTA technology leaders, for an engaging and informative session as we discuss the cybersecurity landscape and how to ensure you are being proactive with your firm’s security posture in 2025. As cyberattacks continue to evolve, it’s critical to understand the strategies bad actors use and how to protect sensitive client data and your firm’s reputation.
Cybersecurity Basics: How to Safeguard Your Firm in an Evolving Digital Landscape
The digital world is constantly evolving and some parts of it are scary. What can a firm or company do to protect itself when it seems like the barbarians are constantly at the proverbial gate?
There are actually several basic steps you can do to protect your data and the data of your clients, not to mention your well-earned reputation.
Future-Proofing Your Law Firm: Key IT Investments for 2025
As a law firm CIO or COO, planning your 2025 information technology budget involves anticipating future needs, addressing current challenges, and leveraging technology to enhance attorney productivity and security. Firms will need to continue to invest in their cloud migration and hybrid-work plans, but here are some other critical areas to focus on.
Citrix Workspace App local privilege escalation vulnerability on Windows (CVE-2024-7889 / CVE-2024-7890)
Local privilege escalation allows a low-privileged user to gain SYSTEM privileges with Citrix Workspace application on Windows.
Jim Moreo Interview at ILTACON 2024 with Jennie Azoulai
Interview with Jim Moreo with Jennie Azoulai (Legal Tech Publishing) at ILTACON 2024.
Why Do a Tech Assessment?
Whether you do them yourself or get some help, taking stock of your technology, your team’s skills and your processes is never a bad thing. Many firms do them every few years as a self-check. They help you identify gaps that need to be addressed and points the way to solutions that may not be evident until you see everything summarized in one place.
Cornerstone.IT Achieves Comprehensive ISO 27001 Certification, Ensuring Enhanced Data Security for Law Firms
To our prospective clients, choosing Cornerstone.IT means you’ll be partnering with an ISO-certified provider. Our services not only meet ISO standards, but we also strive to impart the benefits of these standards to your firm.
Steering Towards the Future: The AI Revolution in Legal Tech with iManage and Microsoft Copilot Integration
As we draw nearer to the introduction of iManage’s innovative Artificial Intelligence (AI) services at ConnectLive NYC, the anticipation is tangible. This groundbreaking initiative was a significant focus at the recent iManage partner conference.
MOVEit Transfer Zero-day Vulnerabiity
If you have been watching the vulnerability space, you know by now about the MOVEit utility security issues. Just today, the news is breaking that several US government agencies have been affected.
We are strongly encouraging everyone to remediate this risk.