Blog
IT Team Resources
![The word Surveys and Reports on a dark background](https://www.exterro.com/uploads/transformed/Default-Images/_880x384_crop_center-center_none/exterro-surveys-and-reports-placeholder-900x393.jpg)
Surveys & Reports
Tech's Role in Changing Data Privacy Landscape
Download this survey report from Exterro and Compliance Week to learn about the state of data retention policies and processes across 30 industries.
![data-privacy-alerts](https://www.exterro.com/uploads/transformed/Resources/_880x384_crop_center-center_none/exterro-data-privacy-alerts-placeholder-900x393.jpg)
Data Privacy Alerts
What Happens When a Password Vault Is Breached?
Learn about the data breaches at password vault company LastPass that potentially compromised millions of user passwords and accounts.
![](https://www.exterro.com/uploads/transformed/Resources/_880x384_crop_center-center_none/exterro-the-state-of-lgrc-in-2023-report-resource-img-900x393.jpg)
Surveys & Reports
The State of Data Governance and Legal in 2023: E-Discovery, Compliance, Privacy, and Internal Investigations
Download this survey report for a holistic look at how legal departments are operationalizing e-discovery, compliance, privacy, and internal investigations.
Blog
5 Excuses That Lead to Over-Retention of Data... and Risk!
![](https://www.exterro.com/uploads/transformed/Resources/_880x384_crop_center-center_none/cisa-response-plan-playbook-resource-img-900x393.jpg)
White Papers
Implementing the CISA Cybersecurity Incident Response Playbook
Blog
Data Alone Isn’t Enough: Why You Need a Defensible, Intelligent Data Inventory
![X graphic with Blog Post copy](https://www.exterro.com/uploads/transformed/Default-Images/_880x384_crop_center-center_none/exterro-blog-placeholder-900x393-v2.jpg)
Blog
MD5 Hashing: The Foundation of a Defensible E-Discovery Process
Blog
4 Expert Tips for Incident Response in Remote Workplaces
Blog
4 Data Retention Challenges You Must Be Able to Solve
![](https://www.exterro.com/uploads/transformed/Resources/_880x384_crop_center-center_none/zero-trust-and-forensic-investigations-wp-resource-img-900x393.jpg)
White Papers
Forensic Investigations in Zero Trust Environments
Learn what technology capabilities you need to conduct effective investigations in Zero Trust environments in this whitepaper.
![](https://www.exterro.com/uploads/transformed/Default-Images/_880x384_crop_center-center_none/exterro-data-privacy-alerts-placeholder-900x393.jpg)
Data Privacy Alerts
European Council and European Parliament Agree to New Cybersecurity Standard
Learn about the NIS2 standard for cybersecurity proposed by the European Council and European Parliament.