Computer Forensics


Mar 2017

Digital Forensics Tips for Real-World Enterprises

Learn how to protect your organization with these digital forensics tips. Most everyone has some familiarity with digital forensics. After all, we’ve seen CSI Cyber, right? For the record, that isn’t really how it works. For starters, we do not complete investigations in less than sixty minutes. In addition, we aren’t that attractive and we prefer to work in well-lit rooms. Regardless, what is true...

Read More


Jun 2016

Are You Focusing on the Wrong Threats?

You’ve probably been breached already. No kidding. So, instead of focusing on the wrong threats, you should “assume breach” and begin to collect the data you’ll need to help you prevent further attacks. In other words, assume that your average security controls are inadequate to stop a breach and concentrate on limiting the damage a hacker can do once (s)he is inside your network. For...

Read More


Aug 2015

Figuring Out Inside Threats

Just a few short years ago, an employee walking out of the building carrying boxes of sensitive company information would have raised a few eyebrows and subjected that employee to some questioning. But, these days, when many employees are plugging in their various mobile devices to company computers as the course of business, how can you be sure that worker isn’t downloading intellectual property to...

Read More


Apr 2015

Have I Been Hacked?

After working in digital forensics for more than eight years, it is common to receive a call from a potential client that thinks they have been “hacked.” After a few minutes of conversation, my finely tuned “paranoid client” meter quickly becomes active. If it reaches my predetermined threshold, I try to systematically walk through the technical aspects required for this to be realistic and provide...

Read More


Jun 2011

The “Details” of Digital Forensics

Before we begin, let’s dispel a myth or two about digital forensics: digital forensics is not what you see on CSI. For starters, you cannot power up a computer with potential evidence and begin pilfering through the information. Those actions will modify and destroy evidence potentially preventing admissibility into court (Attorneys: remind your clients of this). Secondly, digital forensic investigations can be very detailed and time-consuming:...

Read More