The man was careful to cover his tracks, erasing e-mail messages and other incriminating documents. He sent especially sensitive messages to his prospective employer via a Web-based e-mail service, not the corporate e-mail system of his current employer. And with good reason: The man had landed his new position by promising heâ€™d bring trade secrets from his former job. Unfortunately, the former employer didnâ€™t suspect anything until months after the rogue employee had left. By then, his PC had been erased and given to another employee. The prospects of finding evidence of suspected wrongdoing seemed bleak. But forensic investigators at Huron Consulting Services LLC in Chicago had a few tricks up their sleeves…
Cellebrite's Monica Harris on Achieving Balance in Corporate Investigations and E-Discovery
What Can You Tell Us About Your Password? A Contextual Approach
Uncovering Windows Registry Data and the Latest Mac Artifacts
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.