Reducing privacy and compliance risk with data minimization

Eric Vanderburg Companies collect millions of gigabytes of information, all of which has to be stored, maintained, and secured. There is a general fear of removing data lest it be needed some day but this practice is quickly becoming a problem that creates privacy and compliance risk. Some call it “data hoarding” and I am […]

October 7, 2010 |

Business Continuity and Backups in the Virtual World

Eric Vanderburg Virtualization has really become a mainstream technology and an effective way for organizations to reduce costs. As mentioned in previous articles, it simplifies processes but also creates new information security risks to handle. This article is concerned with business continuity and how virtualization can create many new opportunities and efficiencies in your business […]

September 27, 2010 |

Critical security considerations for server virtualization

Eric Vanderburg Virtualization is an excellent way to make better use of existing IT resources but utilizing them for multiple tasks.  It also allows for hardware and software to be further abstracted so that hardware compatibilities become less of an issue.  Virtual machines can be highly specialized since an entire physical box does not need […]

August 10, 2010 |

MAC times in computer forensics

Written by: Eric Vanderburg MAC times are a form of metadata that record when files were created, modified and accessed and are named as follows: Created time: ctime Modification time: mtime Access time: atime You should be aware that the MAC times differ by file system and operating system and this can impact a forensic […]

October 10, 2009 |

Inside the Hacker’s Head – White paper

It is important to know about hacking because these skills, under controlled circumstances and with the proper authority can be used to determine system vulnerabilities by taking actions a hacker would do.  It is also important to understand this topic to better be able to counter the attempts of others to break into or misuse […]

September 2, 2008 |

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology