Site map
An overview of the available content on this site. Keep the pointer still over an item for a few seconds to get its description.
- Company
- Services
-
Interhack News
- News from 2021
- News from 2020
-
News from 2019
- Protecting Your Mobile Identity From SIM Card Swaps
- Data As Evidence: Analysis of Logs for Litigation
- Small Business Cyber Vulnerability
- Detection and Defense: The Use of Modern Technology in Victimization
- Spring Cleaning: Computers and Password Changes
- Fourth and Fifth Amendment Issues in Data Retrieval By Governments
- A House Without Foundation
- Using Cell Phone Data to Defend Your Client
- Demystifying the IT Network
- Google Tracking: Mobile Privacy
- How Businesses Can Protect Themselves
- Stealing Photos Through Public Charging Stations?
- Ring Camera Security
-
News from 2018
- CIO Solutions Gallery Breakfast
- November InfraGard Central Ohio Members Alliance Meeting
- Cyber Monday Safety & How To Avoid Being Scammed For The Holidays
- Election Security
- Cyber security risks: What you need to know
- Interhack to Exhibit at 12th Annual Taste of IT Conference
- Mock Data Breach With PorterWright
- Privacy vs. Convenience: A Twenty Year Retrospective of the Internet Privacy Project
- Assumed Breach Testing
- Bowling Green State University Lecture & Demonstration
- BBB Cyber Security Event
- Interhack to Exhibit at the Midwest Labor & Employment Law Seminar
- CIO Solutions Gallery Showcase
- Interhack to Exhibit at the Ohio State Bar Legal Forum
- CIO Solutions Gallery Practicum Dinner
- News from 2017
- News from 2016
-
News from 2015
- Strategic Information Security
- WeAreIT and Edison Community College
- Ohio Association of Criminal Defense Lawyers Superstars Conference
- ILTACON 2015 Incident Response Planning That's Battle Tested, Client Approved
- Incident Response at LegalSEC
- Charges Dismissed: How Experts May Undermine your Forensic Evidence
- Crypto War II: Protecting the Infrastructure
- Computer Forensics: Trade Secret Theft Case Study
- Defending Against Cyberattack
- Privacy Implication of Mobile Phone Sales
- Crypto War II: Weakening the Infrastructure
-
News from 2014
- Computer-Aided Theft
- What To Do When (Not If) Data Breaches Occur
- Stopping Trade Secret Theft
- Cracking the Data Encryption Standard
- When Cryptography Is Outlawed...
- Putting the Science in Computer Science: Applications from Boardrooms to Courtrooms
- Windows XP: End of Life
- The Cyberwarfare Threat
- Computer Security: Is Anyone Safe?
- Cracking the Code at Hawken Middle School
-
News from 2013
- Matt Curtin to present to Ohio Management Lawyers Association
- Matt Curtin to speak at Ohio University to student telecommunications group
- Mason Evans to lead Ohio State Bar Association Webcast
- Matt Curtin to speak at the Central Ohio INFOSEC Summit
- Matt Curtin to present at Financial Aid Administration Conference
- Matt Curtin to present to local Criminal Defense Lawyers Association
- Interhack to appear local news station to show dangers of public WiFi
- Interhack Framework used for California Attorney General's Data Breach Report
- Dave Porter and Mason Evans to present in Business Law Seminar
- Matt Curtin to be the keynote at Computing Sciences Conference
- Matthew Curtin to speak at (ISC)² workshop
- Matt Curtin to be on Big Data Panel at ILTA conference
-
News from 2012
- Interhack Presents Discovery in the Cloud at Columbus Bar Association
- Interhack Shares Expertise at Northern Ohio InfraGard Chapter Meeting
- Matt Curtin Is Featured Speaker for Open Source Club at OSU
- Interhack Participates in ILTA Panel Discussion on Information Security in Law Firms
- Interhack Grows Information Assurance Practice
- Interhack Presents Incident Response Case Study to Central Ohio ISSA
- Interhack Promotes Scientist Working on Big Data in Litigation
- Interhack Presents at Contingency Planners of Ohio (CPO) Annual Conference
- Successfully Handling Data Breaches
- Interhack Sponsors Central Ohio Infragard Critical Sector and Issues Conference
- Corporate E-Discovery Seminar at the Columbus Bar Association
- Social Media: A Frontier of Evidence
- How CIOs Can Prepare for Electronic Discovery
- Interhack Supports 2012 Ohio State Bar Association Convention and Annual Meeting
- Compromise in the Cloud
-
News from 2011
- Interhack Adds Litigation Perspective to State Cyber Security Symposium
- Drilling to Perfect Data Incident Response
- Online Seminar: Health Care Incident Response
- Interhack Presents Defensible Forensic Collection for International Legal Technology Association
- Interhack Presents Integrity in Digital Evidence at Ohio Judicial College
- Drilling to Perfect E-Discovery
- Cloud Computing Presents Legal and Data Security Challenges
- Interhack Supports the Ohio State Bar Association Annual Convention
- Computer Scientist Shares Experience Rebutting Opposing Experts' Opinions
- ABA Business Law Section Seeks Expertise of Interhack Computer Science
- Computer Scientist Prepares Law Students for Best Use of Experts
- Health Care Incident Response
- Matt Curtin Tells Crypto War Stories at Ohio University
- Beyond Simple Compliance: Using Data-driven Prioritization of Controls
-
News from 2010
- Electronic Discovery of Mobile Devices
- Quantifying Risk
- Risk Management: Is Your Visibility Severely Clouded?
- Computer Science Expertise for the Defense
- Interhack Analyst Speaks About Security at Nonprofit Conference
- State of Ohio Cyber Summit
- Computer Expert Tells How to Prepare for Litigation With Good Information Management
- Information Risk Expert Jack Jones Joins Interhack
- Interhack Exhibits Computer Expert Services at American Bar Association Expo
- Interhack Presents Intrusion Prevention Summit Webcast
- Key to Interhack Taxonomy of Data Breaches Presented at IEEE Workshop
- Interhack Returns to the Ohio State Bar Association Annual Convention
- Preparing for the Data Breach: Live Incident Response Team Drilling
- Interhack at HIMSS 2010—How Compromise of Health Information Happens
- Interhack at HIMSS 2010—Electronic Health Information in Litigation
-
News from 2009
- Compliance in Privacy and Data Security: How to Avoid Liability
- Using Information to Focus Resources in Litigation
- Preparing for a Data Breach: Three Questions Every CIO Needs to Answer
- Prepare for and Respond to Data Breaches
- Using Science to Combat Data Loss: On the East Coast
- Computer Science Expertise for the Defense
- Where Law, Technology and Risk Management Converge
- Why Information Security is More Than a Technology Issue
- Interhack Founder Matt Curtin Discusses the Future of Data Loss at IT Value Studio
- Interhack Exhibits Computer Expert Services at American Bar Association Expo
- Interhack Senior Analyst Lee Ayres Appears on Information Security Panel
- Interhack Exhibits at Ohio State Bar Association Annual Convention
- Data Breaches Vary by Industry
- Interhack Presents Hands-On Incident Response Testing at RSA 2009
- Interhack Speaks at Regional International Legal Technology Association Event
-
News from 2008
- Asking the Right Questions: Forensic Analysis of Data, or How to Make BlackBerry Data Hearsay
- Using Information to Focus Resources: When, Why and How to Use Computer Experts
- e-discovery and public records requests
- Electronic Evidence in Criminal Defense
- When to Hire a Computer Expert Witness
- Using a Taxonomy to Analyze Recent Data Losses
- Lee Ayres Presents Breach Taxonomy Paper
- Interhack Sponsoring Ohio Digital Government Summit
- Matt Curtin Demonstrates Expert Witness Technique
- Interhack's Forensic Computing Practice Grows
- Building a Successful Organization
- Forensic Computing 101
- Electrons Are the New Paper
- Interhack returns to the Ohio State Bar Association's annual convention in Columbus, Ohio
- Emerging Trends in Fraud Investigation and Prevention conference
-
News from 2007
- Interhack Expands Forensic Computing Practice as Lee Ayres Joins
- Interhack Expands Forensic Computing Practice as Heath Rambo Joins
- Interhack Expands Forensic Computing Practice as Bob Mathis Joins
- Ensuring Data Security and Privacy in Teradata EDWs
- DESCHALL Source Code Released
- Beyond Table Top: Role-Playing Drills in Incident Response Training
- Forensic Computing: The Intersection of Law and Technology
- April 2007 CIO Solutions Gallery
- Addressing the Needs of Technology Education
- Computing in Adjudication
- Data Breach Notification
- Abby Park Promoted to Marketing Manager
- Confessions of a Plaintiff's Expert
- Matt Curtin to Speak at University of Findlay
- The Role of Security in Clinical Informatics
-
News from 2006
- Discussing Identity Theft with TechColumbus
- Privacy Foundation February 2006 Seminar
- Brute Force: Cracking the Data Encryption Standard
- Booksigning at RSA 2006
- Electronic Evidence in Criminal Defense
- Introduction to Forensic Computing
- Computer Science and Related Technologies Seminar
- Ensuring Data Security and Privacy in Teradata EDWs
- Interhack Expands Forensic Computing Practice
- IT and the Law: Dealing with Privacy and Compliance
- Showing the Real World of IT to Ohio's Girls
- News from 2005
- News from 2004
- News from 2003
- News from 2002
- News from 2001
- News from 2000
- News from 1999
-
Publications
- Protection of Data and Prevention: Advice for Chief Executive Officers, Managers, and Information Technology Staff
- Forensic Analysis of Mobile Devices
- Incident Handling: When the Breach Occurs
- Discovery Beyond Documents
- Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
- The Next Twenty-Five Years in Computer Science
- Introduction to Forensic Computing
- Electronic Evidence in Criminal Defense
- Anatomy of Online Fraud: How Thieves Targeted eBay Users But Got Stopped Instead
- Identity Theft: If We Didn't Dodge a Bullet
- Security: Built-In or Bolt On?
- Spying on Spyware
-
HIPAA Security HyperRule
- About the HIPAA Security HyperRule
- Complete Rule
- HHS Commentary
- Part 160: General Administrative Requirements
- Part 162--Administrative Requirements
- Part 164--Security and Privacy
- Appendix A
- 03-3877.pdf
- Regulatory Impact Analysis
- Security Rule: Required Items
- Security Rule: Addressable Items
- Summary
- Background
- Security Standards: General Overview
- IV. Provisions of the Final Regulation
- V. Collection of Information Requirements
- Federalism
- 164.103 Definitions
- 164.104 Applicability
- 164.105 Organizational requirements
- 164.302 Applicability
- 164.304 Definitions
- 164.306 Security standards: General rules
- 164.308 Administrative safeguards
- 164.310 Physical safeguards
- 164.312 Technical safeguards
- 164.314 Organizational requirements
- 164.316 Policies and procedures and documentation requirements
- 164.318 Compliance dates
- Changes to 164.500
- Understanding Information Assurance Services
- Cryptography in Practice
- Infosec: Friend or Foe?
- Discovery Beyond Documents
- Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
- Incident Handling: When the Breach Occurs
- Mobile Devices: Evidentiary Gold Mine or Empty Mine Shaft?
- Spector Professional Review and Commentary
- Comments on Guidelines on Securing Public Web Servers
- PCFriendly Enables DVD Backchannels
- Bank One Online Puts Customer Account Information at Risk
- A Failure To Communicate: When a Privacy Seal Doesn't Help
- Getting To Know You (Intimately): Surreptitious Privacy Invasion on the E-Commerce Web
- DoubleClick Opt Out Protocol Failure == Opt In
- Opting In, By Accident
- Why Anti-Virus Software Cannot Stop the Spread of Email Worms
- Shibboleth: Private Mailing List Manager
- What's Related? Everything but your privacy
- SKIPJACK and KEA Algorithm Specifications
- Firewalls FAQ
- National Security Action Memorandum 160
- A Brute Force Search of DES Keyspace
- Snake Oil Warning Signs: Encryption Software to Avoid
- What DESCHALL Means
- Analysis of Compact Disc Digital Rights Management
- Pelendur: Steward of the Sysadmin
- Address Munging Considered Harmful
- Creating an Environment for Reusable Software Research: A Case Study in Reusability
- "Write Once Run Anywhere'': Why It Matters
- Smalltalk FAQ
- Unix User Hierarchy
- Hierarchy of TeXnical Accomplishments
- Contact