Digital Forensics

Information and Resources Related to Digital Forensics, Incident Response, Forensic Lab Management, Technical Investigations, and more...


Information and Resources Related to Cybersecurity, Information Security, Internet Safety, Cyberstalking, Metrics, Cyber Management, and more...

Information Technology

Information Technology, IT Management, IT Metrics, Risk Management, Change Management, IT Leadership, Communications, and more...

The digital breadcrumbs in the Parkland, FL shooting: Were they followed?

  As more details emerge from the horrible mass shooting in Parkland, Florida on February 14, 2018, one item of interest is a YouTube comment left on a channel created by a man named Ben Bennight of Mississippi. Mr. Bennight noticed a disturbing comment left by someone with the YouTube account name of “Nikolas Cruz”

iOS 10 Parental Control Settings

  I have discussed here and here many of the dangers that kids face when trying to navigate technology and the Internet and some ideas for parents on how to mitigate these risks.  Parents have several choices available to them for parental controls on iOS devices and for this post, I tried several of the

Cybersecurity Considerations with Bring Your Own Device (BYOD) Implementations

  Bring Your Own Device (BYOD) refers to allowing end users the ability to use their own personal mobile devices (e.g., phones, tablets, laptops, etc.) to conduct business instead of having a corporate device issued to them.  BYOD is often seen as a cost savings and a step toward a “21st Century Workforce” by executives. 

Making a Risk-Based IT Change Management Process

  A key component to any successful and mature Information Technology (IT) team is a disciplined change control process.  Few things are more frustrating to an IT manager than having a service affecting outage and not being able to immediately identify recent changes to the environment. Change control requires rigor, discipline, auditing, and a commitment from

Reducing Classified Spillage Incidents

  A classified spillage (commonly referred to as a spill) incident occurs when information is transmitted, processed, or stored on an information system that is not accredited to contain that level of information.  Usually, this occurs when a classified document (confidential, secret, top secret, etc.) is created, stored, or emailed on unclassified systems or networks. The