Computer Forensics


Computer Forensics

Digital Forensics Services

Get computer forensics advice, updates and how-tos from our information security experts.


02

Apr 2018

Discovering Digital Identity Using IP Addresses

As a response to numerous questions from some of our legal clients regarding IP addresses, we’ve compiled the following information: In the physical world, we have many attributes to determine our identity: phone number, social security number, driver’s license number, etc. However, in the online world, there is often an assumed level of anonymity. Someone can develop an Internet pseudonym, post defamatory information to a...

Read More


20

Mar 2017

Digital Forensics Tips for Real-World Enterprises

Learn how to protect your organization with these digital forensics tips. Most everyone has some familiarity with digital forensics. After all, we’ve seen CSI Cyber, right? For the record, that isn’t really how it works. For starters, we do not complete investigations in less than sixty minutes. In addition, we aren’t that attractive and we prefer to work in well-lit rooms. Regardless, what is true...

Read More


27

Jun 2016

Are You Focusing on the Wrong Threats?

You’ve probably been breached already. No kidding. So, instead of focusing on the wrong threats, you should “assume breach” and begin to collect the data you’ll need to help you prevent further attacks. In other words, assume that your average security controls are inadequate to stop a breach and concentrate on limiting the damage a hacker can do once (s)he is inside your network. For...

Read More


10

Jun 2016

Digital Forensics Spending Expected to Double by 2021

Cybercrime. Terrorism. Insider Theft. These are three reasons why digital forensics spending is expected to more than double from just over $2 billion in 2014 to nearly $5 billion in 2021. According to the Transparency Market Research study, the “ability to recover complex data from electronic devices, fingerprint recovery from metals and DNA profiling” are driving market growth. The report says costs are going down as a...

Read More


06

Aug 2015

Figuring Out Inside Threats

Just a few short years ago, an employee walking out of the building carrying boxes of sensitive company information would have raised a few eyebrows and subjected that employee to some questioning. But, these days, when many employees are plugging in their various mobile devices to company computers as the course of business, how can you be sure that worker isn’t downloading intellectual property to...

Read More


29

Apr 2015

Have I Been Hacked?

After working in digital forensics for more than two decades, it is common to receive a call from a potential client who thinks they have been “hacked.” After a few minutes of conversation, a “paranoid client” meter can quickly become active. If it reaches a predetermined threshold, we systematically walk through the technical aspects required for this to be realistic and provide an honest assessment...

Read More