There a material differences in what is collected depending on which of the two forensically-sound collection methodologies is used. And, there are no "do-overs." A second, later collection will...

The refreshing breeze litigators might be sensing blowing in from the Western reaches of the Northern District of Illinois likely emanates from the courtroom and chambers of Judge Iain Johnston...
ESI Electronically Stored Information and Electronic Evidence are seemingly everywhere, and nowhere, all at the same time. Tracking it down to preserve or collect in a defensible way, or hunting for...
Protek President and CEO Keith Chval recently had a practical and hopefully mildly entertaining article published in the Brief journal of the DuPage County Bar Association. Keith distinguishes...
A great twofer opportunity here! All sectors of the U.S. are badly in need of talented and ethical cybersecurity professionals, and we all probably know at least one high schooler who could use some...
The "Willie Sutton Rule" strikes again. "Why do you hack law firms' sites? Because that's where the [goods] are." Why would a hacker bother attempting exploits of whatever victims' individual sites...