When someone leaves a company under questionable circumstances, especially if sensitive information was involved, one of the first things a…
As a follow-up to a previous post, it’s important to highlight one of the most overlooked risks to sensitive business…
It’s Not Always Malicious, But It’s Still a Threat Much of this blog has focused on the classic insider threat:…
Yes, Really, How to Spend Less You read that right. I’m going to tell you how to save money when working…
When Trusted Employees Turn While we now do more work for defendants accused of intellectual property theft than we once…
Start with the Right Foundations Before diving into the types of data we can recover from smartphones, whether it’s an…