All Articles

Litigation

Preparing For The Zombie Invasion: Demonstrating The ROI Of A Litigation Readiness Plan

Let’s face it – suggest a litigation readiness plan to any corporate officer and you might as well be trying to convince him of an impending zombie invasion. While many of us in the legal space understand the importance of such a plan, business generally does not respond to...

Read More

Corporate Counsel

Mobile Device Forensics: The New Frontier

As the world of mobile devices continues to evolve, so has their ability to create, store, and transmit electronic communications and other forms of electronically stored information (ESI). Mobile devices are no longer seen as a “gadget” or “toy” only used by technology-...

Read More

Digital Coordination: Is Your Computer Forensics Investigation A Symphony Or A Circus?

Digital forensics is changing, and you should be prepared for more of it in the future, not less. The increase of cloud computing has, in some ways, reduced the instances of hard drive analyses, but the explosion in mobile devices has more than offset the need for device-level analysis for...

Read More

Cybersecurity

Data Privacy – The Year 2013 Has Become 1984

Editor: In view of your more than 13 years in the field of data analysis, advance search technologies and data production, what is your assessment of the security surrounding the NSA’s data collection techniques in view of the Edward Snowden revelations? Matzen: As far as the security...

Read More

Discovery

Big Data: The Elephant In The E-Discovery Room

We have been hearing plenty about Big Data lately. The massive amount of phone and Internet metadata analyzed by the NSA certainly comes to mind. A little less well-known, but still a great example, was Netflix’s analysis of Big Data when taking the gamble on “House of Cards,”...

Read More

Technology

Responding To Alleged Intellectual Property Theft: Mitigating Business Risk With Computer Forensics

Sometimes, departing employees take things with them that they should not. Sometimes, disgruntled employees send or leak sensitive information to competitors. Confidential communications, financial information, and/or work product from Company A is found on work computers at Company B. I have...

Read More

Anti-Corruption

Hiring Your Discovery Consultant For Fraud Investigations

Editor: Please start our discussion by telling us how iDiscovery Solutions (iDS) evolved from its roots in expert testimony and strategic consulting into the realm of information governance and e-discovery technology and processes. Grobbel: This evolution was driven by clients who demanded the...

Read More