2008 is a special year for the digital security community. Twenty years have passed since the Morris Worm brought computer security to the attention of the wider public, followed by the formation of ...
Forensic computer science deals with the preservation and processing of computer evidence. Forensics is basically applying science to the evidentiary process. In the case of computer evidence, the ...
All too frequently a peer will contact me in a panic about recovering deleted files from a suspect’s hard drive–after my peer has trampled on the digital evidence like a rookie police officer at his ...
Analyzing forensics logs requires a unique approach. Here are the basics of what you need to know and the tools to use. The recent cybersecurity symposium that aimed to “prove” the 2020 US election ...
In previous articles, I’ve discussed log management and incident response in the age of compliance. It’s time to cover a separate topic that has connections to both log analysis and incident ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results