Windows Forensics: Evidence of Execution
Ever wonder how forensic analysts and information security and incident response practitioners can recreate timelines demonstrating who ran which applications…
Ever wonder how forensic analysts and information security and incident response practitioners can recreate timelines demonstrating who ran which applications…
In digital forensic analysis, timelining and visualization are critical skills. Learn how to use them to improve your investigations
From the time an information security incident occurs, every minute is crucial. The last thing you want is to have…
The similarities between a nuclear dystopia and accessing the internet are surprising. Businesses should consider treating the internet as if…
When your organization reaches a risk assessment score threshold it finds acceptable, that’s not the time to take your foot…
With states reopening, businesses are returning employees to the office. Security measures must be taken to return safely and smoothly.…
Information security compromise is impossible to prevent 100% of the time. So, there needs to be an incident response plan.…
Sometimes, running an information security program can feel a lot like being in the middle of a horror film. Turn…
You can’t prevent all security incidents from happening, but businesses that avoid many of them tend to have commonalities. Here…
When the lights go down in the city, it might be something far more nefarious than bad weather or a…
On July 11, 2019 Monroe College in New York City fell prey to a ransomware attack. The hackers are asking…
It’s impossible to stop every breach from happening. There is no “if” to being breached, only “when”. It’s important for…