-
Defending Against Cyberattack
COLUMBUS (February 5, 2015). How can an organization defend itself in the face of sophisticated cyberattacks? Interhack Sr. Specialist Matthew M. ...
Located in
Interhack News
/
News from 2015
-
Privacy Implication of Mobile Phone Sales
Interhack looks at mobile phones discarded for sale for WTTE Fox 28 in Columbus, finding messages, photos, business documents, and other private information. ...
Located in
Interhack News
/
News from 2015
-
Crypto War II: Weakening the Infrastructure
COLUMBUS (February 10, 2015). Interhack Founder and cybersecurity expert C. Matthew Curtin will present at a MEMBERS-ONLY meeting of the Central Ohio InfraGard ...
Located in
Interhack News
/
News from 2015
-
News from 2015
Interhack news from the year 2015.
Located in
Interhack News
-
Asking the Right Questions: Forensic Analysis of Data, or How to Make BlackBerry Data Hearsay
Interhack founder C. Matthew Curtin and Interhack Senior Analyst Lee Ayres demonstrate how easily BlackBerry data can be falsified such that an investigator ...
Located in
Interhack News
/
News from 2008
-
Using Information to Focus Resources: When, Why and How to Use Computer Experts
Matt Curtin and Lee Ayres present Using Information to Focus Resources: When, Why and How to Use Computer Experts to the Columbus Bar Association.
Located in
Interhack News
/
News from 2008
-
e-discovery and public records requests
Matt Curtin will lead a discussion on the topic of e-discovery and public records requests at a monthly meeting of CIOs and IT Directors in Delaware, Ohio.
Located in
Interhack News
/
News from 2008
-
Electronic Evidence in Criminal Defense
Matt Curtin and Chris Shiflet will present Electronic Evidence in Criminal Defense to the Columbus Bar Association in Columbus, Ohio.
Located in
Interhack News
/
News from 2008
-
When to Hire a Computer Expert Witness
Matt Curtin and Chris Shiflet will present When to Hire a Computer Expert Witness to the Columbus Bar Association in Columbus, Ohio.
Located in
Interhack News
/
News from 2008
-
Using a Taxonomy to Analyze Recent Data Losses
Interhack Senior Analyst Lee Ayres proposes a naming scheme for computer security breaches, when he presents a peer-reviewed scientific paper, soon to be ...
Located in
Interhack News
/
News from 2008