The Meaning of Security Hype – The State of Security

The Meaning of Security Hype – The State of Security.

via The Meaning of Security Hype – The State of Security.

Posted in Best Practices, Data, Network Control, Open Source, Privacy, Security, The Industry | Tagged , , , , , , , , , , | Leave a comment

Big email: How to effectively find the needle in the haystack (Part 2)

Big email: How to effectively find the needle in the haystack (Part 2).

via Big email: How to effectively find the needle in the haystack (Part 2).

Posted in Data, Data Mapping, Production Tools & Tips, Search, The Industry | Tagged , , , , , , , , , | Leave a comment

Big email: How to effectively find the needle in the haystack (Part 1)

Big email: How to effectively find the needle in the haystack (Part 1).

via Big email: How to effectively find the needle in the haystack (Part 1).

Posted in Data, Litigation, Production Tools & Tips, Search, The Industry | Tagged , , , , , , | Leave a comment

Ghost-Hunting With Anti-Virus | FireEye Blog

Ghost-Hunting With Anti-Virus | FireEye Blog.

via Ghost-Hunting With Anti-Virus | FireEye Blog.

Posted in Data, Network Control, Open Source, Privacy, Security | Tagged , , , , , , , , , , , , , | Leave a comment

The absurdly simple guide to backing up your PC | ITworld

The absurdly simple guide to backing up your PC | ITworld.

via The absurdly simple guide to backing up your PC | ITworld.

Posted in Best Practices, Data, Production Tools & Tips, The Industry | Tagged , , , , , , , , , , , | Leave a comment

The Heartbleed Hit List: The Passwords You Need to Change Right Now

The Heartbleed Hit List: The Passwords You Need to Change Right Now.

via The Heartbleed Hit List: The Passwords You Need to Change Right Now.

Posted in Best Practices, Data, Network Control, Privacy, Production Tools & Tips, Security | Tagged , , , , , , | Leave a comment

Apple’s security flaws: Are you paranoid enough yet? | Vulnerability assessment – InfoWorld

Apple’s security flaws: Are you paranoid enough yet?

via Apple’s security flaws: Are you paranoid enough yet? | Vulnerability assessment – InfoWorld.

via Apple’s security flaws: Are you paranoid enough yet? | Vulnerability assessment – InfoWorld.

Posted in Security, The Industry | Tagged , , | Leave a comment

Technology: Using contract terms to specify the timing and scope of the duty to preserve

Technology: Using contract terms to specify the timing and scope of the duty to preserve.

via Technology: Using contract terms to specify the timing and scope of the duty to preserve.

Posted in Best Practices, Litigation, Production Tools & Tips, The Industry | Tagged , , , , , , | Leave a comment

The IT Specialist Weekly

The IT Specialist Weekly.

via The IT Specialist Weekly.

Posted in Best Practices, Network Control, Privacy, Production Tools & Tips, Security | Tagged , , , , , , , , , | Leave a comment

Can We Craft Discovery as Up-to-Date as the Evidence? | Ball in your Court

Can We Craft Discovery as Up-to-Date as the Evidence? | Ball in your Court.

via Can We Craft Discovery as Up-to-Date as the Evidence? | Ball in your Court.

Posted in Best Practices, Data, Litigation, Production Tools & Tips, The Industry | Tagged , , , , , , , , , , | Leave a comment