When performing incident response and forensics on a compromised system, the focus of analysis is on the most immediately available and relevant sources of evidence. Volatile data collected from a running system, the hard drive, network flow data, and logs collected on a central server all serve as useful sources for determining the particulars of the incidents. But what about incidents that go back further, requiring you to dig into backup tapes – and potentially very old ones?
Uncover Evidence With XAMN, the Best Digital Forensic Analysis Solution
Cyacomb's Graham Little & Mike Burridge on Making the Online World a Safer Place
Rainbowboy: How the Mobile IT-Forensic Laboratory Helps German Police Solve Their Cases Faster
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.