The digital breadcrumbs in the Parkland, FL shooting: Were they followed?

  As more details emerge from the horrible mass shooting in Parkland, Florida on February 14, 2018, one item of interest is a YouTube comment left on a channel created by a man named Ben Bennight of Mississippi. Mr. Bennight noticed a disturbing comment left by someone with the YouTube account name of “Nikolas Cruz”

Why Multifactor Authentication is so Important

  As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or business data secure.  While it is true that the tools and techniques used by hackers are getting more sophisticated, the reality is that most breaches, even the very large and highly publicized breaches, could

Sitting in the Hot Seat: OPM Director Answers Tough Questions about 2015 Breach

  The Office of Personnel Management (OPM) data breach takes cyberattacks against the United States to a new level.  The motivation of the cybercriminals responsible for the OPM breach was not financial or hacktivism, but purely intelligence gathering.  For context, the OPM is responsible for conducting security clearance investigations for many federal agencies and this

Digital Forensics / Incident Response Forms, Policies, and Procedures

  For my Master of Science Degree in Information Security and Assurance (MSISA) I wrote my thesis about the overall lack of standards, certifications, and accreditation in the digital forensics discipline (available here).  This lack of rigor within our profession may very well jeopardize the credibility of our discipline. Over the past decade that I have

Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifications, and Accreditation

Abstract   Technology and digital evidence are at the forefront of nearly every criminal, civil, and corporate investigation in the world. For the past thirty years digital evidence such as computers, cellular phones, tablets, servers, GPS devices, gaming consoles, storage devices, and network infrastructure devices have been forensically analyzed and presented in legal proceedings. In many

Protecting your Family Against Inappropriate Internet Content

  Anyone who has experience with the Internet knows how easily it is to stumble across inappropriate Internet content.  As a father of two, I am extremely cautious about my children's online activities and utilize parental controls on everything I can.  Whether you are a business owner trying to reduce what your employees can access