As we move into 2015, it’s appropriate to look back and think about what we’ve learned about the threat landscape. To that end, CheckPoint’s 2014 Security Report makes for some pretty interesting reading. According to their research, in a typical...
Category: Security
Security Breaches – Assigning the Blame
One of the few newsletters I try to read on a regular basis is the one put out by the good folks at WServerNews.com. Their January 5 issue has an excellent article on security entitled “Blame the Software.” In part,...
eDiscovery Part 4 – The Discovery Process
This is the fourth and final installment in our series of blog posts on eDiscovery, containing video excerpts from the presentation we made on September 26 at the O365 Nation Fall Conference in Redmond. This installment is a bit longer...
eDiscovery Part 3 – Discovery Hold in Microsoft Exchange
This is the third in our series of blog posts on eDiscovery, containing video excerpts from the presentation we made on September 26 at the O365 Nation Fall Conference held in Redmond. Part 1 dealt with the lifecycle of an...
eDiscovery Part 2 – PST Files vs. Exchange Archiving
This is the second in a series of blog posts on eDiscovery, which will include video excerpts from the presentation we made at the O365 Nation Fall Conference held in Redmond last month. In Part 1 of this series, we...
eDiscovery Part 1 – Lifecycle of an Email Message
Last Friday, September 26, VirtualQube was invited to present at the O365 Nation fall conference in Redmond on the subject of eDiscovery and Organizational Search in Microsoft Office. O365 Nation is a new organization created by our long-time friend Harry...
Causes and Costs of Cyber Crime
I read a couple of items today about security and cyber crime that I found rather interesting. One was an article that came out a week ago on infoworld.com about the “First Annual Cost of Cyber Crime Study,” conducted by...
Copy Machine Security Risks
Here’s a 5-minute video you really need to watch. It’s a report by CBS News on what could be a huge security risk that most companies probably haven’t even considered: the office copy machine. And I’m not talking about the...