Cornerstone Information Technologies, LLC Recognized on CRN’s 2025 MSP 500 List

New York, NY, February 12, 2025 — Cornerstone Information Technologies, LLC is recognized in CRN’s Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2025.
Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance

WATERLOO, ONTARIO and EDEN PRAIRIE, MINNESOTA – December 16, 2024 – Arctic Wolf® and BlackBerry Limited (NYSE: BB; TSX:BB), two global leaders in security software and services, today announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance® endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of organizations around the world. With this acquisition, Arctic Wolf ushers in a new era of simplicity, flexibility, and outcomes to the endpoint security market, delivering the security operations results customers have been asking for.
Understanding the Anatomy of a Breach and How to Protect Your Firm

Join Cornerstone.IT & Arctic Wolf, ILTA technology leaders, for an engaging and informative session as we discuss the cybersecurity landscape and how to ensure you are being proactive with your firm’s security posture in 2025. As cyberattacks continue to evolve, it’s critical to understand the strategies bad actors use and how to protect sensitive client data and your firm’s reputation.
Cybersecurity Basics: How to Safeguard Your Firm in an Evolving Digital Landscape

The digital world is constantly evolving and some parts of it are scary. What can a firm or company do to protect itself when it seems like the barbarians are constantly at the proverbial gate?
There are actually several basic steps you can do to protect your data and the data of your clients, not to mention your well-earned reputation.
Future-Proofing Your Law Firm: Key IT Investments for 2025

As a law firm CIO or COO, planning your 2025 information technology budget involves anticipating future needs, addressing current challenges, and leveraging technology to enhance attorney productivity and security. Firms will need to continue to invest in their cloud migration and hybrid-work plans, but here are some other critical areas to focus on.
Citrix Workspace App local privilege escalation vulnerability on Windows (CVE-2024-7889 / CVE-2024-7890)

Local privilege escalation allows a low-privileged user to gain SYSTEM privileges with Citrix Workspace application on Windows.
Jim Moreo Interview at ILTACON 2024 with Jennie Azoulai

Interview with Jim Moreo with Jennie Azoulai (Legal Tech Publishing) at ILTACON 2024.
Why Do a Tech Assessment?

Whether you do them yourself or get some help, taking stock of your technology, your team’s skills and your processes is never a bad thing. Many firms do them every few years as a self-check. They help you identify gaps that need to be addressed and points the way to solutions that may not be evident until you see everything summarized in one place.
Cornerstone.IT Achieves Comprehensive ISO 27001 Certification, Ensuring Enhanced Data Security for Law Firms

To our prospective clients, choosing Cornerstone.IT means you’ll be partnering with an ISO-certified provider. Our services not only meet ISO standards, but we also strive to impart the benefits of these standards to your firm.
Steering Towards the Future: The AI Revolution in Legal Tech with iManage and Microsoft Copilot Integration

As we draw nearer to the introduction of iManage’s innovative Artificial Intelligence (AI) services at ConnectLive NYC, the anticipation is tangible. This groundbreaking initiative was a significant focus at the recent iManage partner conference.