The Computer Expert Firm - Interhack Corporation
Advanced Search…

Navigation

  • Home
  • Company
    • Our Mission
    • Our History
    • Why We're Different
    • Privacy Statement
    • Careers
    • Our People
    • Our History
  • Services
    • Expert Services
    • Cybersecurity
    • Incident Management
  • Interhack News
    • News from 2025
    • News from 2024
    • News from 2023
    • News from 2022
    • News from 2021
    • News from 2020
    • News from 2019
    • News from 2018
    • News from 2017
    • News from 2016
    • News from 2015
    • News from 2014
    • News from 2013
    • News from 2012
    • News from 2011
    • News from 2010
    • News from 2009
    • News from 2008
    • News from 2007
    • News from 2006
    • News from 2005
    • News from 2004
    • News from 2003
    • News from 2002
    • News from 2001
    • News from 2000
    • News from 1999
  • Publications
    • Protection of Data and Prevention: Advice for Chief Executive Officers, Managers, and Information Technology Staff
    • Forensic Analysis of Mobile Devices
    • Incident Handling: When the Breach Occurs
    • Discovery Beyond Documents
    • Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
    • The Next Twenty-Five Years in Computer Science
    • Introduction to Forensic Computing
    • Electronic Evidence in Criminal Defense
    • Anatomy of Online Fraud: How Thieves Targeted eBay Users But Got Stopped Instead
    • Identity Theft: If We Didn't Dodge a Bullet
    • Security: Built-In or Bolt On?
    • Spying on Spyware
    • HIPAA Security HyperRule
    • Understanding Information Assurance Services
    • Cryptography in Practice
    • Infosec: Friend or Foe?
    • Discovery Beyond Documents
    • Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
    • Incident Handling: When the Breach Occurs
    • Mobile Devices: Evidentiary Gold Mine or Empty Mine Shaft?
    • Spector Professional Review and Commentary
    • Comments on Guidelines on Securing Public Web Servers
    • PCFriendly Enables DVD Backchannels
    • Bank One Online Puts Customer Account Information at Risk
    • A Failure To Communicate: When a Privacy Seal Doesn't Help
    • Getting To Know You (Intimately): Surreptitious Privacy Invasion on the E-Commerce Web
    • DoubleClick Opt Out Protocol Failure == Opt In
    • Opting In, By Accident
    • Why Anti-Virus Software Cannot Stop the Spread of Email Worms
    • Shibboleth: Private Mailing List Manager
    • What's Related? Everything but your privacy
    • SKIPJACK and KEA Algorithm Specifications
    • Firewalls FAQ
    • National Security Action Memorandum 160
    • A Brute Force Search of DES Keyspace
    • Snake Oil Warning Signs: Encryption Software to Avoid
    • What DESCHALL Means
    • Analysis of Compact Disc Digital Rights Management
    • Pelendur: Steward of the Sysadmin
    • Address Munging Considered Harmful
    • Creating an Environment for Reusable Software Research: A Case Study in Reusability
    • "Write Once Run Anywhere'': Why It Matters
    • Smalltalk FAQ
    • Unix User Hierarchy
    • Hierarchy of TeXnical Accomplishments
  • Contact
You are here:
  1. Home
Item type
New items since

Search results

RSS Subscribe to an always-updated RSS feed.

149 items matching your search terms.
Sort by relevance date (newest first) alphabetically
  1. How CIOs Can Prepare for Electronic Discovery

    Interhack Director Mason Evans speaks to CIOs at the CIO Practicum held at the University of Kentucky about planning and strategies to reduce the pain and cost ...

    Located in Interhack News / News from 2012
  2. ILTACON 2015 Incident Response Planning That's Battle Tested, Client Approved

    C. Matthew Curtin, CISSP of Interhack will join a panel of experts to discuss the process of planning for security incidents at ILTACON 2015.

    Located in Interhack News / News from 2015
  3. Incident Response at LegalSEC

    Interhack founder C. Matthew Curtin, CISSP will be presenting at the International Legal Tech Association (ILTA) LegalSEC conference in Baltimore, Maryland on ...

    Located in Interhack News / News from 2015
  4. Information Risk Expert Jack Jones Joins Interhack

    (August 19, 2010) Interhack adds information risk expertise to its Information Assurance practice, bringing Jack A. Jones on as a Visiting Scientist. Jack ...

    Located in Interhack News / News from 2010
  5. Interhack Adds Litigation Perspective to State Cyber Security Symposium

    Representatives from agencies of the State of Ohio gather in downtown Columbus for a Cyber Security Symposium in honor of National Cyber Security Awareness ...

    Located in Interhack News / News from 2011
  6. Interhack Analyst Speaks About Security at Nonprofit Conference

    (October 15, 2010) Analyst Lee Ayres participates in panel helping companies learn how to secure the privacy of protected information in a nonprofit setting.

    Located in Interhack News / News from 2010
  7. Interhack at HIMSS 2010—Electronic Health Information in Litigation

    (March 3, 2010) Interhack founder C. Matthew Curtin presents Electronic Information in Litigation on March 3, 2010 at HIMSS 2010 in Atlanta, Georgia.

    Located in Interhack News / News from 2010
  8. Interhack at HIMSS 2010—How Compromise of Health Information Happens

    (March 3, 2010) How does data loss occur in health care? Interhack founder C. Matthew Curtin, CISSP presents an analysis of five years' worth of breach data, ...

    Located in Interhack News / News from 2010
  9. Interhack Discusses Incident Response at Central Ohio Association of Corporate Counsel

    The Central Ohio Chapter of the Association of Corporate Counsel gathers at Nationwide Arena for a data breach seminar presented by Porter Wright on February ...

    Located in Interhack News / News from 2012
  10. Interhack Exhibits at Ohio State Bar Association Annual Convention

    (May 13-15, 2009) Interhack returns to the Ohio State Bar Association's Annual Convention in Cleveland, Ohio, where the company will showcase its computer ...

    Located in Interhack News / News from 2009
  • « Previous 10 items
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • ...
  • 15
  • Next 10 items »
Copyright © 2000-2025 Interhack Corporation

Interhack, interhack.net, interhack.com, and the Interhack logo are trademarks of Interhack Corporation.

  • Site Map
  • Accessibility
  • Contact