Loading... Please Wait!

Blog Articles

Wednesday, September 20, 2017
Determining whether programs or malware actually ran on a system is an important goal of seasoned examiners when investigating computer evidence.  Generally, there are several artifacts left behind anytime executables are run – regardless of whether the program is Outlook, Chrome, or something...

Wednesday, September 13, 2017
Data is the single most coveted jewel in business today; with many companies leveraging its power to increase profits by pushing items they believe you’ll buy. From the book you've been wanting to read, to the shoes you’ve wanted to flaunt, to the food you’re craving this minute. Watch a couple of...

Wednesday, September 6, 2017
Computer forensics and investigations of electronic assets continue to get more complicated as technology progresses.  We have more types of devices which may contain dispositive evidence than ever before, each coming in several flavors with multiple operating system iterations.  In addition to...

Wednesday, August 30, 2017
In a world of ever-growing data, it’s hard to reduce the volume of documents that must be reviewed, but analytics can make a big impact. Analytics is a broad tool kit that encompasses a suite of technologies including technology assisted review (TAR), email threading, textually duplicate document...

Wednesday, August 23, 2017
It’s Friday afternoon and the conversation goes a little like this, “Wait, what?  They’re leaving?  Where are they going?  Is there any opportunity to help them reconsider?” When a key employee departs an organization, it can take a toll on clients and colleagues, productivity and morale.  What...

Pages

Download Keys to Today’s Information Governance Landscape