Investigations/Forensics

Investigations/Forensics news, information, and how-to advice

internet gavel keyboard
tiger3

In Depth

Hackers capture dynamic data to prepare for effective, stealthy attacks

Hackers use offensive forensics to gain credentials such as user names and passwords that allow them to access sensitive data while concealing their identity, delaying attack discovery, and covering their tracks.

computer keyboard on fire 87584864
In Depth

Avoiding burnout: Ten tips for hackers working incident response

Recent security graduates entering the world of incident response, or those with a strong security background making a career move, face a challenging environment that often leads to frustration and burnout.

Why you need more than daily practice to be good at incident response

Move past constant reaction with an evidence-driven approach to improve incident response and the entire protection cycle. Calculate the financial impacts of incidents and solutions to make better decisions that protect what matters...

facial recognition

Why facial recognition isn't the way of the future...yet

It's the how the future is meant to be, isn't it? The good guys need to find a bad guy in a crowd of people, so they start scanning the environment with a camera that is equipped with facial recognition technology. Seconds later,...

Were stolen passports allowed on MH370?

Late Friday evening my wife shared with me the news that Malaysian Airlines flight MH370 had gone missing. I got quiet. This was the very same flight path route that I took from to Kuala Lumpur to Beijing a few months ago after...

Why smart security leaders are using the Target breach to change their approach to detection

Two months after the Target data breach, emphasis remains on prevention. The smart security leaders are improving detection. Here are some insights on making the pivot.

If Target got breached because of third party access, what does that mean for you?

The real opportunity for security professionals is to side-step speculation and use the coverage to spark productive conversations. The kinds of discussions that help others understand your value and set the stage for necessary...

Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up to snuff?

Threats of terrorism and extensive security measures suggest that Sochi is preparing to host an Olympics like none other

8 ways physical security has evolved

Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Here are eight of...

Blue Cross: 840,000 healthcare records at risk after laptop theft

Two employee laptops stolen in November from Horizon Blue Cross Blue Shield of New Jersey

Shopping risks to guard against this holiday season

Credit card skimming devices and hidden cameras are just two ways crooks make this the most scam-filled time of the year for shoppers

Keeping high-profile meetings safe and secure

Advanced technology and the ubiquity of smartphones make it easier than ever for outsiders to comprimise the security of meetings, but Harlan Calhoun has some tips to fight off would-be spies

Weak global economy contributed to $112 billion loss from retail theft

Shoplifting, fraud, organized crime, and errors led to 1.4 percent dent in retail sales

Meeting the subject of a threat assessment: Is it always necessary?

When assessing a threat in the workplace, it isn't always necessary to meet with the subject in question, says Dr. Steve Albrecht

How to take advantage of the Adobe breach to advance the conversation about security in your organization

Breaches aren't new. Learning this week that Adobe experienced and disclosed a recent security breach isn't surprising. And if it's not surprising for us, then it barely registers with most people.

Seductive technology: What are its implications for data security?

Alluring devices like the Apple iPhone have caused a shift towards the "Bring Your Own Device" paradigm, but what does it mean for both personal and corporate security?

Missing the real opportunity of Snowden and Manning

The common reaction is an almost knee-jerk demand for more, stricter controls. In most cases, these controls won't work. If we want people engaged in the process, we need to let them take responsibility. We need to develop transparent

Searching for trouble: the hidden risk of pressure cookers, backpacks and quinoa

As the family considers what just happened to them, the lessons for the rest of us are just beginning. This is an event that gives us a great opportunity to engage in meaningful corporate discussions. Take time now to consider how...

Load More