-
Services
Machine learning in cybersecurity
Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute…
Read more -
Professional Services
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser…
Read more -
Services
Achieving seamless eDiscovery
Business and litigation go hand in hand in the 21st century. From litigation support personnel to the lawyers themselves, organizations face a common challenge: how to streamline…
Read more -
Technologies
Data privacy is changing the relationship between you and your customers
The capture and collection of personal data is an important requirement in order to provide the individual, customized and tailored…
Read more -
Professional Services
GDPR puts focus on the security of your EIM solutions
In its report, The role of technology in your GDPR strategy, IDC identifies EIM technologies as central to achieving compliance with…
Read more -
Professional Services
The importance of knowing ‘where’ in digital forensic analysis
With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a…
Read more