FireEye consultants frequently utilize Windows registry data when performing forensic analysis of computer networks as part of incident response and compromise assessment missions. This can be useful ...
If a company has experienced a security breach, it’s often difficult to quantify the IT risks to the organization. In the face of a threat to information resources and customer confidence, the company ...
Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. A solid toolset is at the ...
Download the entire January, 2011 issue of Dark Reading. Security professionals are overworked, stressed, and don't have enough hours in the day to do their jobs. Why? Too often it's because they're ...
New devices and programs packed with data provide a real challenge for forensics professionals. Now, Syngress has three new books, one by forensics guru Harlan Carvey, that give you the tools to ...
BlackLight, for those not already familiar with it, quickly analyzes computer volumes and mobile devices. It sheds light on user actions and now even includes analysis of memory images. BlackLight ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results