All Articles
Litigation
Preparing For The Zombie Invasion: Demonstrating The ROI Of A Litigation Readiness Plan
Let’s face it – suggest a litigation readiness plan to any corporate officer and you might as well be trying to convince him of an impending zombie invasion. While many of us in the legal space understand the importance of such a plan, business generally does not respond to...
Read MoreCorporate Counsel
Mobile Device Forensics: The New Frontier
As the world of mobile devices continues to evolve, so has their ability to create, store, and transmit electronic communications and other forms of electronically stored information (ESI). Mobile devices are no longer seen as a “gadget” or “toy” only used by technology-...
Read MoreDigital Coordination: Is Your Computer Forensics Investigation A Symphony Or A Circus?
Digital forensics is changing, and you should be prepared for more of it in the future, not less. The increase of cloud computing has, in some ways, reduced the instances of hard drive analyses, but the explosion in mobile devices has more than offset the need for device-level analysis for...
Read MoreCybersecurity
Data Privacy – The Year 2013 Has Become 1984
Editor: In view of your more than 13 years in the field of data analysis, advance search technologies and data production, what is your assessment of the security surrounding the NSA’s data collection techniques in view of the Edward Snowden revelations? Matzen: As far as the security...
Read MoreDiscovery
Big Data: The Elephant In The E-Discovery Room
We have been hearing plenty about Big Data lately. The massive amount of phone and Internet metadata analyzed by the NSA certainly comes to mind. A little less well-known, but still a great example, was Netflix’s analysis of Big Data when taking the gamble on “House of Cards,”...
Read MoreTechnology
Responding To Alleged Intellectual Property Theft: Mitigating Business Risk With Computer Forensics
Sometimes, departing employees take things with them that they should not. Sometimes, disgruntled employees send or leak sensitive information to competitors. Confidential communications, financial information, and/or work product from Company A is found on work computers at Company B. I have...
Read MoreAnti-Corruption
Hiring Your Discovery Consultant For Fraud Investigations
Editor: Please start our discussion by telling us how iDiscovery Solutions (iDS) evolved from its roots in expert testimony and strategic consulting into the realm of information governance and e-discovery technology and processes. Grobbel: This evolution was driven by clients who demanded the...
Read More