Jim Mazotas would never forget the call. His company was doing a vulnerability audit for a medium-sized university which suspected its admins of misconduct. The work had started on a Friday, and would continue for the entire weekend; he got the call on Sunday night. “[My team] said, ‘You need to come over here,’” Mazotas recalled. “And I said, ‘Just tell me over the phone.’” But his team insisted, so he headed over to the work site.
He was completely unprepared for what they’d found. “They showed me a jukebox drive system that [had] hundreds of [files depicting . . .