The DNC Hack Was Not an Act of War: What we call it under international law should influence our response

What is the Most Underestimated IT Security Threat, and Why?

The Neutral Corner: Recapturing the Benefits of Predictive Coding by Using an eDiscovery Special Master