The Five W’s (and How) of Ransomware

Ransomware is quickly becoming the weapon of choice used by hackers against consumers and businesses alike.  Its impact can be especially devastating to businesses as an infection on one single machine can spread to other computers and shut down an entire network.  Ransomware may be lurking inside an email attachment or online advertisement, and the […]

August 12, 2016 |

The human brain vs. computers in the identity challenge

Eric Vanderburg The concept of identity is core to the protection of data.  Data and other computing resources exist to be used by individuals, each of whom has an identity that is used to grant of deny access to such resources.  However, identity is not limited to humans.  Computer services also have an identity that […]

March 22, 2016 |

Big Data ROI – How to use what you already have

Eric Vanderburg We may not be using more of our brains but we can probably use more of our data. Did you know that organizations typically use only 1 percent of the data they collect? Why is this and how can we change it? Do organizations need more motivation, utility, expertise, tools, or just better […]

January 6, 2016 |

Top security initiatives for 2016

Eric Vanderburg 2016 is going to be a big year for security. News of data breaches and the major technological innovations of 2015 will put more pressure on companies to implement effective organizational security. I believe 2016 will see major initiatives in these seven areas: Securing the supply chain, leveraging more data analytics for security, […]

December 22, 2015 |

No compromise with the hybrid cloud

Eric Vanderburg This statement may be familiar to many who have considered cloud services and it was both the start and end to many cloud discussions. What is most important to you, cloud security and service customization or flexibility and cost? Those who picked security and service customization adopted a private cloud model and those […]

November 19, 2015 |

Cloudsizing: Finding the right fit for your cloud

Eric Vanderburg The maturation of the cloud is fascinating as it continues to adapt, providing more opportunities for companies and consumers to leverage the vast computing and storage power of computers around the world. Whether those resources are housed in a corporate data center or dedicated hosting facility as part of private cloud services or […]

November 10, 2015 |

Which Security Career is Right for You?

Eric Vanderburg Security is a growing field, and with its growth come many different career options. As you gain experience in different security areas, you may choose to further specialize or move into management in that area. Some security roles include analyst, network security engineer, auditor, computer forensics and penetration testing.

October 29, 2015 |

Preserving email integrity in eDiscovery

Eric Vanderburg I was recently asked the question, Can eDiscovery systems prove the integrity of the email that they discover? If so, how? Email differs from loose files in that emails are contained within a database such as Microsoft Exchange or IBM Lotus Notes.  Loose files are typically hashed using a mathematical algorithm that can […]

October 27, 2015 |

The missing leg – integrity in the CIA triad

Eric Vanderburg Information security is often described using the CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are the three elements of data that information security tries to protect. If we look at the CIA triad from the attacker’s viewpoint, they would seek to compromise confidentiality by stealing data, integrity by […]

October 20, 2015 |

Security Career Networking Tips

Eric Vanderburg Do you know why all the major online retailers offer a way for users to review products? It’s because people want feedback from others when making a decision. Job searches are no different. A resume may say a lot about skills and experience, but it says little about a person and, in the […]

October 15, 2015 |

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology