Blog

THE REAL CSI: CCTV ANALYSIS

13:25: The midday sun is beating down on Miami-Dade County. The Lieutenant leads a chase through the busy streets of central Miami – shades on, gun in holster, barely breaking into a sweat. Three of his officers follow close behind.


Information Security Governance

Information Security Governance

“Information can have great value as an organisational asset but can be a toxic liability if not handled properly” Richard Thomas, Former Information Commissioner.

The rapid pace of new technology is making it increasingly easier …

Forensic First Response

In 2011, the UK Cabinet Office published a paper (The Cost of Cyber Crime), which quantified the cost to UK businesses of intellectual property theft as £9.2bn, and industrial espionage as £7.6bn. Whilst these figures have since been challenged and …

Can a file ever be deleted?

The issue of removing data from the electronic environment has risen once again with Google and other search providers clashing with the House of Lords (BBC News). Having spent the best part of a decade in …

EMAILS ARE FOREVER PART 2

This is the second part of a two-part article written by Léon Atkins, Chief Compliance Officer, UDG Healthcare plc. He discusses how easy it is to recover deleted emails and warns of what this means for e-disclosure in litigation.

EMAILS ARE FOREVER PART 1

This two-part article is written by Léon Atkins, Chief Compliance Officer, UDG Healthcare plc. He discusses how easy it is to recover deleted emails and warns of what this means for e-disclosure in litigation.

It seems that I am …

GETTING MORE OUT OF ESE DATABASES

The Extensible Storage Engine (ESE) is a database technology developed by Microsoft. ESE databases have featured in Microsoft Windows operating systems for some time now and aren’t always the nicest database format to deal with. The Windows.edb and Contacts.edb are …

SECURITY – THE NECESSARY BURDEN

Over the last few years information security has been a central concept for the IT industry and never very far away from the headlines. Whether this involves state funded hackers from the east or inadvertent data leaks from the west, …

Next Page »