Digital forensics News
March 18, 2016
Spreading cybercrime, like the ransomware attacks on NYT and BBC, has Congress considering Bitcoin security. Also in Searchlight: Apple might boost iCloud encryption; Amazon eyes selfie payments.
October 14, 2015
Druva has released Mobile Forensics, which automatically collects data from an organization's Android devices. The new product aims to better facilitate mobile e-discovery jobs.
March 31, 2014
Gary McGraw discusses why the software security segment of the IT security industry is growing at a faster rate than the category as a whole.
Digital forensics Get Started
Bring yourself up to speed with our introductory content
Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor. Continue Reading
Virtualization expert Paul Henry provides a step-by-step guide to imaging a virtual machine disk (*flat.vmdk) in a forensically sound manner. Continue Reading
Expert Karen Scarfone examines the top wireless intrusion prevention systems (WIPS) to help readers determine which may be best for them. Continue Reading
Evaluate Digital forensics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Dan Sullivan compares how the top-rated big data security analytics tools measure up against each other to help you select the right one for your organization. Continue Reading
Expert Dan Sullivan examines the top security analytics products to help readers determine which may be best for their organization. Continue Reading
Expert Dan Sullivan outlines three use case scenarios for security analytics tools and explains how they can benefit the enterprise. Continue Reading
Manage Digital forensics
Learn to apply best practices and optimize your operations.
No time to prepare for incident handling? Security tools aim to automate the incident response process and help organizations lessen the time between threat detection and response. Continue Reading
Professional incident response providers can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding threat. Continue Reading
Digital, computer-generated records have been used as evidence in recent court cases, and the trend could cause major changes for corporate data governance. Continue Reading
Problem Solve Digital forensics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised. Continue Reading
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Continue Reading
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading