The Forensicators Present ... Go on the Cybersecurity Offensive: Threat Intelligence
Over the last few years, we all have heard about major cyber and ransomware attacks. These cybercrimes cost organizations billions of dollars each year, as personally identifiable information (PII) – social security numbers, credit cards, email addresses, and other personal data – of millions of consumers are exposed and sold by hackers.
The Forensicators Present ... Big Data Beasts
"Big Data Monsters" is courtesy of iDS Sr. Consultant and data expert, Bobby Williams. Nearly everything we do increases our digital footprints and feeds a race of big data monsters. Bobby talks about these creatures - how they were created, how they're fed, and how they can be tamed to help keep you and your organization safe.
Drawing a Privacy Line in Today's Data-Rich World: MCC Roundtable
In June, the U.S. Supreme Court agreed to review Carpenter v. U.S., which concerns warrantless access to cellphone location records. This thrusts the high court smack into the murky intersection of digital evidence and the Fourth Amendment. Add in the different standards for disclosure of electronic communications held by third-party internet service providers under the Stored Communications Act, and you have a recipe for controversy and confusion. In the discussion below, our participants confront these and related issues from a variety of vantages: Sonya Judkins, manager of electronic discovery and compliance with Sprint; U.S. Magistrate Judge David Waxse from the U.S. district court in Kansas City, Kansas, a highly experienced judicial “maverick” on ESI searches; Don Myers, a Littler Mendelson shareholder and member of the firm’s eDiscovery group; Dan Regard, a programmer and lawyer who is CEO of iDiscovery Solutions; and Hunter McMahon, director of data analytics for iDiscovery Solutions. Their remarks have been edited for length and style.
The Forensicators Present... I USB, You USB, We All USB!
iDS forensics expert Arnold Garcia discusses the continued proliferation of USB storage devices and how the data gathered from and around them can make the difference in many cases and investigations, including theft of IP and trade secret issues.
The Forensicators Present ... Are You Prepared for the Next Big Ransomware Attack?
iDS expert Supreet Singh discusses WannaCry, NotPetya, and how your organization can be better prepared for future ransomware attacks.
THE ETHICAL HACKER: Are You Accounting for One of Your Largest Cybersecurity Risks?
iDiscovery Solutions Announces New Director of Analytics - Hunter McMahon
iDiscovery Solutions, Inc. (iDS), is pleased to announce the addition of Hunter McMahon to its growing staff of highly experienced professionals. Mr. McMahon comes on board as Director of Data Analytics and will be based in iDS’ new satellite office in Greenville, SC.
Mr. Hunter McMahon is the Director of Data Analytics for iDiscovery Solutions (iDS), bringing over a decade of experience in technology and the legal field. He focuses on providing innovative solutions to overcome the unique challenges, and maximize potential advantages, from a variety of data systems....
THE ETHICAL HACKER: Can We Talk About Safety, For a Change?
The Forensicators Present ... Danger Lurking in the IT Shadows
Shadow IT is difficult to identify, it’s quickly becoming Cloud based, and it can represent a risk to your organization. When Shadow IT is resolved properly, it's a win for everyone, but you first have to know it’s there and the business need it’s solving. iDS can work with you to help identify Shadow IT, define its corporate existence and need, and help bring it in-house.