WHERE’S YOUR DATA- IDENTIFYING DATA REMNANTS AND FORENSIC LEFTOVERS The modern computing environment is one of many interconnected devices, sharing data, and interacting to form […]
“THE BEST OFFENSE IS A GOOD DEFENSE” APPLIED TO CYBERSECURITY IN THE SUPPLY CHAIN Confronting and Thwarting Threats to the Digital Supply Chain Head-On 1 […]
DESTRUCTION IS A PROCESS NOT A PARTICLE Destruction Is A Process Not A Particle Does particle size matter in the whole destruction scheme of things? […]
WHO IS THE DATA PROTECTION OFFICER? Who is the Data Protection Officer? Everyday companies collect terabytes of data about their customers, staff, and other individuals […]
COMPLYING WITH EVOLVING DATA PROTECTION LAWS As we continue to trudge through this era of cybercrime, federal and state governments are placing increasingly stringent requirements […]