DATA RECOVERY: BEST PRACTICES FOR SERVICE PROVIDERS
OVERVIEW Computer service centers encounter failed hard drives. Data recovery can be arevenue source, but it must be wisely …
Read MoreDIY: Cyber Black Box Decrypt & Modify Traffic On-the-Fly
Dennis Chow, MBA Senior Information Security Engineer This article demonstrates how users can still be susceptible to their secure …
Read MoreComputer Forensics with P2 Commander
By: Pranshu Bajpai Introduction Computer Forensics is the methodical series of procedures and techniques used for procuring evidence from computer …
Read MoreNew Strategies for Secure, Compliant Payment Systems in the Cloud
By: Randal Asay, Chief Technology Officer, Catbird Gartner research shows that virtualization has surpassed 50 percent of all server workloads …
Read MoreThe freeway to CISSP
The freeway to CISSP By Patric J.M. Versteeg, CISSP CISM CISA CRISC CEH ECSA LPT SCF Lead: The freeway (road) …
Read MoreThe 5 Most Dangerous Software Bugs of 2014
BY ANDY GREENBERG Dealing with the discovery of new software flaws, even those that leave users open to serious security …
Read MoreTackling the Challenges of a Mobile, Digitally-Driven World with Advanced Mobile Device Forensics
Five Emerging Challenges in Mobile Device Forensics Law enforcement agencies and enterprises are struggling with too many devices, too many …
Read MoreeForensics Weekly newsletter - 13th of December 2014
eForensics Weekly Introduction to Digital Forensics download your Workshop’s EBOOK Didn't have a chance to try our "Introduction to Digital …
Read MoreAttack Vector
Looking into the world of security there are many attack vectors with respect to validations of the input in …
Read MoreSql Server Performance Counters - PowerShell
by Chris Kitchen What You Will Learn The purpose of this article is to discuss at a high level a …
Read More