Digital forensics News
March 31, 2014
Gary McGraw discusses why the software security segment of the IT security industry is growing at a faster rate than the category as a whole.
Digital forensics Get Started
Bring yourself up to speed with our introductory content
The CISSP exam covers 10 domains, one of which is law, investigations and ethics. In this section of the SearchSecurityChannel.com CISSP Study Guide, you will ensure your knowledge of law, investigations and ethics and security incident response management. Continue Reading
Evaluate Digital forensics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Dan Sullivan outlines three use case scenarios for security analytics tools and explains how they can benefit the enterprise. Continue Reading
Information security professionals can continue to expect more responsibilities as online data protection evolves into a top business priority. Continue Reading
As cloud services grow, so does the likelihood of their use in criminal activities. Providers must prepare for an increased emphasis on cloud forensics. Continue Reading
Manage Digital forensics
Learn to apply best practices and optimize your operations.
It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised. Continue Reading
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading
David Strom provides some examples of log data that provided key clues to enterprise data breaches. Continue Reading
Problem Solve Digital forensics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Continue Reading
The Windows registry can be used as a helpful tool for professionals looking to investigate employee activity or track the whereabouts of important corporate files. In this tip, contributor Ed Skoudis explains how investigators and administrators can interact with the registry to analyze a compromised system and unveils several reg commands that can be used during an investigation. Continue Reading
Digital forensics experts are expensive, which means most customers are turning to service providers to gather evidence and secure a chain of custody. Learn these best practices in securing a chain of custody to help you improve your methodology for evidence gathering. Continue Reading