Digital Forensics

Information and Resources Related to Digital Forensics, Incident Response, Forensic Lab Management, Technical Investigations, and more...

Cybersecurity

Information and Resources Related to Cybersecurity, Information Security, Internet Safety, Cyberstalking, Metrics, Cyber Management, and more...

Information Technology

Information Technology, IT Management, IT Metrics, Risk Management, Change Management, IT Leadership, Communications, and more...

Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifications, and Accreditation

Abstract   Technology and digital evidence are at the forefront of nearly every criminal, civil, and corporate investigation in the world. For the past thirty years digital evidence such as computers, cellular phones, tablets, servers, GPS devices, gaming consoles, storage devices, and network infrastructure devices have been forensically analyzed and presented in legal proceedings. In many

Protecting your Family Against Inappropriate Internet Content

  Anyone who has experience with the Internet knows how easily it is to stumble across inappropriate Internet content.  As a father of two, I am extremely cautious about my children's online activities and utilize parental controls on everything I can.  Whether you are a business owner trying to reduce what your employees can access

Using a SAN or NAS to Store Digital Evidence

  Over the years the question of how to store digital forensic evidence has been raised many times.  Forensic examiners often ask how to properly use a Storage Area Network (SAN) or Network Attached Storage (NAS) device in a digital forensic laboratory.  Some of the main questions asked are: 1) How do you handle the

How to Prevent your Computer from Being Used by Cybercriminals

  Cyber attacks and warfare are among the greatest threats to the United States. The federal government and private industry spend billions of dollars every year in people and technology to defend critical systems and data. Our cyber defenders must stop the threat every time an intrusion attempt is made, but our adversaries only have