AccessData

 

Blog

 
 
E-Discovery Forensics

The global digital age is here. Yet U.S. and European laws are still catching up.

By Abdeslam Afras

May 11, 2016 - U.S. courts spark European ire when they order U.S. companies to give U.S. law enforcement data stored on European soil. This collision is not one-sided, however. European governments also increasingly demand that U.S. tech companies divulge customer message content to combat terrorism, even after updating the EU General Data Protection Regulations to protect the digital privacy of Europeans.

Read Article

Tags: europe, global, privacy, security,

 

Its Your Investigation. Whats Your Solution?

By Lori Tyler

May 9, 2016 - All investigations are not created equal. Are you conducting a large scale compliance matter that requires end-to-end e-discovery? Or is it a targeted search into employee misconduct? Know the difference before you get started – and get to the bottom of your case faster. Learn how you can benefit from AD eDiscovery or AD Enterprise.

Read Article

Tags:

 

Leading experts in the field of digital forensics and e-discovery share their insights at the AccessData® User Summit.

By Kevin DeLong

Apr 22, 2016 - Digital forensics and e-discovery converged at the three-day AccessData® User Summit that featured keynote discussions with experts in the forensic and legal fields. Forensics expert Chet Hosmer, Python Forensics Inc. and information security officer Nicholas (Nick) McLarty, CISSP, Texas A&M Transportation spoke with an audience from both sides of the industry.

Read Article

Tags: apple, digital forensics, e-discovery, fbi,

 

Big Changes in Law Enforcement Remote Computer Searches

By Kevin DeLong

Jun 29, 2016 - Law enforcement digital forensic professionals may soon see a spike in remote digital search and seizure projects. In April, the U.S. Supreme Court approved changes to Rule 41(b) of the Federal Rules of Criminal Procedure that permit federal judges to issue warrants for remote searches of computers if the computer location is concealed by anonymization technology, or in cybercrime Bot investigations spanning several federal districts. The new rule appears to authorize warrants for computer searches both inside and outside the United States. Congress has until December 1 to act, or new Rule 41 becomes law.

Read Article

Tags: computer, digital forensic, law, remote, rule 41,

 

Learning from the NSA: 5 Best Practices for Cyber Incident Response

By Sam Maccherola

Apr 19, 2016 - One of the organizations on the front lines in the worldwide cybersecurity battle is the U.S. National Security Agency (NSA). The NSA -- whose charter is to collect, process, analyze, produce and disseminate intelligence information to support national security missions – is focused intensely on fighting cyberwarfare with both “defensive” tools to protect against cyberattacks and “offensive” tools to disrupt U.S. enemies.

Read Article

Tags: cyberattack, cyberwarfare, incident response, nsa,

 

Reflections on My Experience as a Member of AccessData's International Client Advisory Board

By Stefan Bessling

Mar 23, 2016 - Last summer, I received a phone call from Abdeslam Afras, VP of International Markets at AccessData, inviting me to join their newly formed International Client Advisory Board (ICAB). Curious if this could be my chance to have a “look under the hood,” I wanted to learn more.

Read Article

Tags: advisory board, icab, international,

 

Those Little 8 Words: Experts Weigh-In on e-Discovery Proportionality and the FRCP

By Arvind Chigurala

Mar 3, 2016 - The most significant reforms to electronic discovery rules under the Federal Rules of Civil Procedure (FRCP) since 2006 went into effect on December 1, 2015. “The amendments may not look like a big deal at first glance, but they are,” said Chief Justice John Roberts.

Read Article

Tags: e-discovery, federal, frcp,

 

5 Ways for Forensic Investigators to Crack Mobile Devices

By Kevin DeLong

Feb 25, 2016 - Hackers have been breaking into cell phones for the purpose of fraud and identity theft for years, using a wide range of weapons to achieve their nefarious goals.In fact, the 2015 Verizon Data Breach Investigations Report found hackers were responsible for an estimated financial loss of over $400 million from more than 700 million exposed records.

Read Article

Tags: forensics, ftk, hackers, joanne-spataro, kevin-delong, mobile, nfield, software,

 

The DOJ-Apple Showdown: Setting a Precedent for Mobile Security

By Kevin DeLong

Feb 19, 2016 - A showdown between Apple Inc. and law enforcement agencies, which has been brewing for several months, came to a head this week when U.S. Magistrate Judge Sheri Pym signed off on a Department of Justice request to force Apple to unlock a passcode-protected iPhone belonging to Syed Farook, one of the two people who carried out last year’s mass shooting in San Bernardino, Calif.

Read Article

Tags: apple, computer-forensics, cybersecurity, doj, fbi, obama, privacy, response, san bernadino, terror attack,

 

 < 1 2 3 4 5 >  Last ›