Computer forensics is a slow process. Examiners typically embark on a tedious file review process to determine each file’s relevance to a particular case. This can quickly add hours and extra costs to ...
In previous articles, I’ve discussed log management and incident response in the age of compliance. It’s time to cover a separate topic that has connections to both log analysis and incident ...
Digital forensics has continued to grow in importance as enterprises deal with increasing amounts of digital data and the possibility of cyber-attackers infiltrating their systems. Digital forensics ...
Often I am asked to perform some basic computer forensic analysis for clients who want to know if their computers have been used for “illicit” purposes. One client, the owner of a popular hairdressing ...
The log data you collect from your systems and devices may seem pretty mundane. However, it could contain the precise evidence needed to investigate and successfully prosecute a crime. In order for ...
I recently had the opportunity to perform some basic computer forensic analysis for clients who wanted to know if their computers had been used for "illicit" purposes. One client, the owner of a ...
While at FOSE last week, I attended a very good session called SANS Forensic and Incident Response. The session was led by Rob Lee from Mandiant who moonlights as a computer forensics trainer. Rob ...
Over the course of two days at last month's Computer Security Congress, which was organized by la Coordinación de Seguridad de la Información/UNAM-CERT, researchers ...
Paraben's Chat Examiner is a component of Paraben's P2 Forensic Collection of computer forensic analysis tools. This specialized tool focuses on the analysis and reporting of Internet chat logs. Chat ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results