Loading... Please Wait!

Blog Articles

Wednesday, June 14, 2017
By now, many people have been exposed to the admonition, “Dance like no one is watching; email like it may one day be read aloud in a deposition.”[1] Unfortunately, the core concept behind that saying has not been adopted by many mobile device users. iDS is regularly called upon to image a device...

Wednesday, May 31, 2017
The Cloud is everywhere we turn these days. If you haven’t seen or read an article in the last year about what it is, why you should move to it, why you shouldn’t move to it, how everyone else is moving to it, or other key, critical advice about it, then you haven’t been paying attention. I’m even...

Wednesday, May 17, 2017
In the Internet age, to gain importance, relevance, followers, and money, people often say what they do is an “art.” Merriam-Webster defines an art as a “skill acquired by experience, study, or observation.” Data collection – my art – while scientifically based, passes the Merriam-Webster test. ...

Monday, May 15, 2017
Ransomware. Just the word itself is enough to chill the hearts of everyone from personal users to IT professionals to senior executives. May 12th’s massive attack took down hundreds, perhaps thousands of companies and unknown numbers of individuals and institutions, including the United Kingdom’s...

Tuesday, May 2, 2017
It’s hard to believe the first smartphone was released over 20 years ago. At that time, few thought it would become such an integral part of our lives. Additionally, this year marks the 10th anniversary of the iPhone and its introduction altered the world of digital forensics. Smartphones contain a...

Pages

Download Keys to Today’s Information Governance Landscape