Digital forensics News
March 31, 2014
Gary McGraw discusses why the software security segment of the IT security industry is growing at a faster rate than the category as a whole.
Digital forensics Get Started
Bring yourself up to speed with our introductory content
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Continue Reading
The CISSP exam covers 10 domains, one of which is law, investigations and ethics. In this section of the SearchSecurityChannel.com CISSP Study Guide, you will ensure your knowledge of law, investigations and ethics and security incident response management. Continue Reading
Evaluate Digital forensics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As cloud services grow, so does the likelihood of their use in criminal activities. Providers must prepare for an increased emphasis on cloud forensics. Continue Reading
Manage Digital forensics
Learn to apply best practices and optimize your operations.
David Strom provides some examples of log data that provided key clues to enterprise data breaches. Continue Reading
Problem Solve Digital forensics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Windows registry can be used as a helpful tool for professionals looking to investigate employee activity or track the whereabouts of important corporate files. In this tip, contributor Ed Skoudis explains how investigators and administrators can interact with the registry to analyze a compromised system and unveils several reg commands that can be used during an investigation. Continue Reading
Digital forensics experts are expensive, which means most customers are turning to service providers to gather evidence and secure a chain of custody. Learn these best practices in securing a chain of custody to help you improve your methodology for evidence gathering. Continue Reading