A PREEMPTIVE FORENSIC APPROACH TO CYBER DEFENSE
by Dan Solomon The methods employed by advanced attackers now compel organizations to adopt a more proactive approach to …
Read MoreSECURING YOUR CLOUD EXPERIENCE by Ian Moyse
Securing your Cloud Experience By Ian Moyse, Sales Director www.workbooks.com Eurocloud UK Board Member & Cloud Industry Forum Governance Board …
Read MoreWIRELESS PENETRATION TESTING APPROACH TO SECURING CLIENT’S WIRELESS ACCESS POINT
by Saurabh Kumar Our clients reach to us when wireless access point challenges vague and they are not confident that …
Read MoreThe Barebones Approach to Malware Forensics
THIS IS A BETA VERSION OF THE ARTICLE The Barebones Approach to Malware Forensics By Charles Coker, Nicole Michaelis and …
Read MoreMalware and Anti-Virus Architecture
THIS IS A BETA VERSION OF THE ARTICLE Malware & Anti-Virus Architecture By Cecilia McGuire - MS InfoSec What you …
Read MoreCircumventing Digital Forensics
By Alexander R. Tambascia, D.Sc. Abstract This paper is to cover ways to defeat digital forensics capabilities to recover personal …
Read MoreAccess Data Group - official patron of eForensics Magazine
AccessData Group Overview AccessData Group has pioneered digital investigations and litigation support for more than twenty years and is the …
Read MoreTone at the Top – Today's Biggest Cyber-Security Weakness. By Rob Benjamin.
Tone at the Top – Today's Biggest Cyber-Security Weakness by Rob Benjamin, CRISC, CGEIT New and increasingly sophisticated threats …
Read MoreMaking Information Security Governance Sexy Again. By Jason Broz.
Full issue on ISG coming soon: INFORMATION SECURITY GOVERNANCE – PREORDER Making Information Security Governance sexy Again By Jason Broz, SecureState …
Read MoreCHRISTMAS GIFTS LIST FOR eFORENSICS READERS
How can you turn digital forensics into an idea for a Christmas present? Dear Readers and Experts, The snow …
Read More