Please turn on your JavaScript for this page to function normally.
Mobile forensics in a connected world

In this interview, Andrew Hoog, CEO of viaForensics, talks about the forensic examination of mobile devices, the challenges involved with testifying at trials, and offers …

Competition to crack a virtual terrorist HDD, break into CCTV systems

Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest …

Computer Incident Response and Forensics Team Management

In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers. Having an internal security incident response …

65 challenges that cloud computing poses to forensics investigators

The National Institute of Standards and Technology (NIST) has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to …

SANS revamps its Memory Analysis Course

To provide digital forensic and incident response professionals with a more exact and efficient way to investigate advanced attacks, SANS Institute today announced a complete …

Breaking the backlog of digital forensic evidence

It is time for a change in the way the law enforcement works with digital forensic evidence. Every police investigator needs to be able to quickly and easily analyze digital …

Unified Communications Forensics

“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video …

Innovation, big data and the future of information security

Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security. He has co-authored several books on the topic and has written more …

Placing the Suspect Behind the Keyboard

There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic …

(IN)SECURE Magazine issue 38 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 38 has been released today. Table of contents: …

New expert-level cyber forensics certification

(ISC)2 has developed a new certification, the Certified Cyber Forensics Professional (CCFPSM), as the first global standard for assessing experienced digital forensics …

Becoming a computer forensic examiner

Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order …

Don't miss

Cybersecurity news