The Computer Expert Firm - Interhack Corporation
Advanced Search…

Navigation

  • Home
  • Company
    • Our Mission
    • Our History
    • Why We're Different
    • Privacy Statement
    • Careers
    • Our People
    • Our History
  • Services
    • Expert Services
    • Cybersecurity
    • Incident Management
  • Interhack News
    • News from 2025
    • News from 2024
    • News from 2023
    • News from 2022
    • News from 2021
    • News from 2020
    • News from 2019
    • News from 2018
    • News from 2017
    • News from 2016
    • News from 2015
    • News from 2014
    • News from 2013
    • News from 2012
    • News from 2011
    • News from 2010
    • News from 2009
    • News from 2008
    • News from 2007
    • News from 2006
    • News from 2005
    • News from 2004
    • News from 2003
    • News from 2002
    • News from 2001
    • News from 2000
    • News from 1999
  • Publications
    • Protection of Data and Prevention: Advice for Chief Executive Officers, Managers, and Information Technology Staff
    • Forensic Analysis of Mobile Devices
    • Incident Handling: When the Breach Occurs
    • Discovery Beyond Documents
    • Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
    • The Next Twenty-Five Years in Computer Science
    • Introduction to Forensic Computing
    • Electronic Evidence in Criminal Defense
    • Anatomy of Online Fraud: How Thieves Targeted eBay Users But Got Stopped Instead
    • Identity Theft: If We Didn't Dodge a Bullet
    • Security: Built-In or Bolt On?
    • Spying on Spyware
    • HIPAA Security HyperRule
    • Understanding Information Assurance Services
    • Cryptography in Practice
    • Infosec: Friend or Foe?
    • Discovery Beyond Documents
    • Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
    • Incident Handling: When the Breach Occurs
    • Mobile Devices: Evidentiary Gold Mine or Empty Mine Shaft?
    • Spector Professional Review and Commentary
    • Comments on Guidelines on Securing Public Web Servers
    • PCFriendly Enables DVD Backchannels
    • Bank One Online Puts Customer Account Information at Risk
    • A Failure To Communicate: When a Privacy Seal Doesn't Help
    • Getting To Know You (Intimately): Surreptitious Privacy Invasion on the E-Commerce Web
    • DoubleClick Opt Out Protocol Failure == Opt In
    • Opting In, By Accident
    • Why Anti-Virus Software Cannot Stop the Spread of Email Worms
    • Shibboleth: Private Mailing List Manager
    • What's Related? Everything but your privacy
    • SKIPJACK and KEA Algorithm Specifications
    • Firewalls FAQ
    • National Security Action Memorandum 160
    • A Brute Force Search of DES Keyspace
    • Snake Oil Warning Signs: Encryption Software to Avoid
    • What DESCHALL Means
    • Analysis of Compact Disc Digital Rights Management
    • Pelendur: Steward of the Sysadmin
    • Address Munging Considered Harmful
    • Creating an Environment for Reusable Software Research: A Case Study in Reusability
    • "Write Once Run Anywhere'': Why It Matters
    • Smalltalk FAQ
    • Unix User Hierarchy
    • Hierarchy of TeXnical Accomplishments
  • Contact
You are here:
  1. Home
Item type
New items since

Search results

RSS Subscribe to an always-updated RSS feed.

22 items matching your search terms.
Sort by relevance date (newest first) alphabetically
  1. Compliance in Privacy and Data Security: How to Avoid Liability

    (December 14, 2009) Interhack scientist C. Matthew Curtin and privacy attorney Benita Kahn show how to avoid liability in privacy and data security compliance ...

    Located in Interhack News / News from 2009
  2. Using Information to Focus Resources in Litigation

    (December 9, 2009) Continuing legal education—Electronic evidence not in traditional ``document'' form may remain untapped for the lack of someone who ...

    Located in Interhack News / News from 2009
  3. Preparing for a Data Breach: Three Questions Every CIO Needs to Answer

    (December 2, 2009) It's not a matter of if but when a breach occurs. Prepared CIOs will know the answer to three smart questions before the data loss.

    Located in Interhack News / News from 2009
  4. Prepare for and Respond to Data Breaches

    (December 1, 2009) Interhack rolls out incident response services for executives and attorneys across the country. Reputation is made or broken not on whether ...

    Located in Interhack News / News from 2009
  5. Using Science to Combat Data Loss: On the East Coast

    (October 24-30, 2009) Interhack continues to use science in the battle against data loss. In the spring of this year, C. Matthew Curtin, co-author of the study ...

    Located in Interhack News / News from 2009
  6. Computer Science Expertise for the Defense

    (October 8-9, 2009) Interhack showcases its computer expert services in Chicago, Illinois at the Defense Research Institute Annual Meeting. Interhack Marketing ...

    Located in Interhack News / News from 2009
  7. Where Law, Technology and Risk Management Converge

    (September 16, 2009) Interhack Founder C. Matthew Curtin applies original Interhack research at the intersection of law and technology. He shows the impact of ...

    Located in Interhack News / News from 2009
  8. Why Information Security is More Than a Technology Issue

    (August 11-12, 2009) Interhack Founder C. Matthew Curtin addresses IT leaders from Central Ohio and beyond at the CIO Solutions Gallery Security Summit: ...

    Located in Interhack News / News from 2009
  9. Interhack Founder Matt Curtin Discusses the Future of Data Loss at IT Value Studio

    (August 6, 2009) Interhack Founder Matthew Curtin joins futurist Thornton May at his sixteenth IT Value Studio in Jacksonville, Florida to discuss The State of ...

    Located in Interhack News / News from 2009
  10. Interhack Exhibits Computer Expert Services at American Bar Association Expo

    (July 30 - August 1, 2009) Interhack returns to the American Bar Association Annual Meeting and Expo in Chicago, Illinois where the company showcases its ...

    Located in Interhack News / News from 2009
  • 1
  • 2
  • 3
  • Next 10 items »
Copyright © 2000-2025 Interhack Corporation

Interhack, interhack.net, interhack.com, and the Interhack logo are trademarks of Interhack Corporation.

  • Site Map
  • Accessibility
  • Contact