In the twenty sixth episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, the man with the stories which can never be told, John Wilson, the Chief Information Security Officer and President of Forensics at...more
Data is generated faster than ever, and the magnitude of this reality is amplified during catastrophic events. The recent Los Angeles wildfires and other natural disasters bring to light the daunting challenge of managing an...more
1/22/2025
/ Business Continuity Plans ,
Business Operations ,
Business Strategies ,
Catastrophic Events ,
Crisis Management ,
Data Collection ,
Data Management ,
Data Preservation ,
Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
Law Practice Management ,
Legal Technology ,
Natural Disasters ,
Webinars
Editor’s Note: In this article, HaystackID’s digital forensic experts, John Wilson, and Rene Novoa, highlight a critical issue in digital privacy. Their discovery of Apple’s iOS syncing feature highlights the need for...more
With every iOS update, Apple continues to tighten its grip on user privacy. The newly introduced iOS 18 is no different, bringing a suite of privacy features that are bound to make our lives as digital forensic experts a tad...more
Editor’s Note: In this insightful discussion between John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, and Rene Novoa, Director of Forensics at HaystackID, we delve into the intricate...more
5/1/2024
/ Bitcoin ,
Cloud Service Providers (CSPs) ,
Cybersecurity ,
Data Retention ,
e-Discovery ,
EU ,
General Data Protection Regulation (GDPR) ,
Hardware ,
Instant Messaging Apps ,
Mobile Devices ,
Operating Agreements ,
Personal Information ,
Software
Join us for this exciting presentation as we showcase an innovative solution for remote, targeted smartphone data collection, all thanks to the incredible capabilities of cloud technology....more
In the tenth episode of EDRM Trusted Partner, HaystackID’s podcast series, the man with the stories which can never be told, John Wilson, the Chief Information Security Officer and President of Forensics at HaystackID, sat...more
Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more
5/31/2023
/ Chief Information Security Officer (CISO) ,
Cyberforensics ,
Cybersecurity ,
Data Management ,
Data Retention ,
Discovery ,
e-Discovery ,
e-Discovery Professionals ,
Information Governance ,
Information Technology ,
Litigation Strategies ,
Mobile Devices ,
Popular
Editor’s Note: On November 16, 2022, HaystackID shared an educational webcast on the proliferation of enterprise messaging content in the COVID-era, a proliferation accelerated by the pre-existing industry trend of legal...more
11/28/2022
/ Audits ,
Collaboration ,
Compliance ,
Cybersecurity ,
Data Collection ,
Data Management ,
e-Discovery ,
EDRM ,
Information Governance ,
Instant Messaging Apps ,
Licenses ,
Microsoft ,
Popular ,
Slack ,
Subscription Services ,
Voicemail ,
Zoom®
Editor’s Note: On October 19, 2022, HaystackID shared an educational webcast on the potential impact of Apple’s iOS 16 release on the area of eDiscovery. With iOS 16, new chat manipulation and security features have gone...more
11/4/2022
/ Apple ,
Audits ,
Data Collection ,
Data Security ,
Databases ,
eDisclosure ,
Investigations ,
iTunes ,
Microsoft ,
Mobile Apps ,
Mobile Devices ,
Popular ,
QR Codes ,
Third-Party ,
WhatsApp
Editor’s Note: On August 17, 2022, The Electronic Discovery Reference Model (EDRM) under the leadership of Mary Mack and Kaylee Walstad, hosted HaystackID as we collectively shared an educational webcast developed to...more
8/25/2022
/ Blockchain ,
Copyright ,
Cryptocurrency ,
Decentralized Finance (DeFi) ,
Digital Assets ,
Digital Currency ,
Digital Ledger Technology ,
Investigations ,
Investment ,
Non-Fungible Tokens (NFTs) ,
Popular ,
Smart Contracts ,
Stablecoins ,
SWIFT ,
Trademarks ,
Transparency
With the increasing importance of privacy and security in today’s business world coupled with the advancement and acceptance of transaction technologies ranging from blockchain and cryptocurrencies to non-fungible tokens...more