All Articles
Investigations
The Ethical Hacker: Key Employee Departures Can Leave Danger In Their Wake
It happens to us all. We thought things were going great, and then the unexpected. There’s someone else. I’m not happy anymore. I need something more, or our long-term plans are incompatible. Whatever the reason, critical and important employees leave organizations. When this happens,...
Read MoreDiscovery
Turning Liabilities into Assets: To make intelligent decisions during litigation, you need to fully understand the electronic data
It was a good case, a simple case, alleging wrongful discharge. The merits were in favor of the defense, and, as evidence came in, it was lining up cleanly and consistently with the defendant’s recollection of the events. Barring any unforced errors, it would be a relatively smooth win. Then...
Read MoreThe Ethical Hacker: Best Defense for Today’s Ransomware? Basic IT
I’ve been fairly consistent in my opinions, and I hope my viewpoints are well known by now. People, process and policy are the ways to win the cyber war and secure your organization against the threats it faces in cyberspace. I truly believe it’s more a people problem than a technology...
Read MoreIt’s the Context, Not the Content: Data-based discovery has shifted priorities
In the legal world, there was a simpler time – a time before the “e” in e-discovery. When the Federal Rules of Civil Procedure were established in 1938, handwritten and typewritten documents were the primary methods for creating content. If you wanted to duplicate content,...
Read MoreTechnology
The Ethical Hacker: Are You Accounting for One of Your Largest Cybersecurity Risks?
I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams to help assess...
Read MoreCybersecurity
The Ethical Hacker: How to Protect Your Company from Ransomware Attacks
Ransomware. Just the word itself is enough to chill the hearts of everyone from personal users to IT professionals to senior executives. May 12th’s massive attack took down hundreds, perhaps thousands, of companies and unknown numbers of individuals and institutions, including the United...
Read MoreCybersecurity
The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically
These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention. Acronyms and...
Read More