Why Multifactor Authentication is so Important

  As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or business data secure.  While it is true that the tools and techniques used by hackers are getting more sophisticated, the reality is that most breaches, even the very large and highly publicized breaches, could

Sitting in the Hot Seat: OPM Director Answers Tough Questions about 2015 Breach

  The Office of Personnel Management (OPM) data breach takes cyberattacks against the United States to a new level.  The motivation of the cybercriminals responsible for the OPM breach was not financial or hacktivism, but purely intelligence gathering.  For context, the OPM is responsible for conducting security clearance investigations for many federal agencies and this

Digital Forensics / Incident Response Forms, Policies, and Procedures

  For my Master of Science Degree in Information Security and Assurance (MSISA) I wrote my thesis about the overall lack of standards, certifications, and accreditation in the digital forensics discipline (available here).  This lack of rigor within our profession may very well jeopardize the credibility of our discipline. Over the past decade that I have

Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifications, and Accreditation

Abstract   Technology and digital evidence are at the forefront of nearly every criminal, civil, and corporate investigation in the world. For the past thirty years digital evidence such as computers, cellular phones, tablets, servers, GPS devices, gaming consoles, storage devices, and network infrastructure devices have been forensically analyzed and presented in legal proceedings. In many

Protecting your Family Against Inappropriate Internet Content

  Anyone who has experience with the Internet knows how easily it is to stumble across inappropriate Internet content.  As a father of two, I am extremely cautious about my children's online activities and utilize parental controls on everything I can.  Whether you are a business owner trying to reduce what your employees can access

Using a SAN or NAS to Store Digital Evidence

  Over the years the question of how to store digital forensic evidence has been raised many times.  Forensic examiners often ask how to properly use a Storage Area Network (SAN) or Network Attached Storage (NAS) device in a digital forensic laboratory.  Some of the main questions asked are: 1) How do you handle the