A Gresham-based computer forensics consulting group has launched a cross-country expansion, opening an office in Manhattan last month. NTI Breakwater, a division of Seattle-based Breakwater Security Associates, hopes to keep a central laboratory in the Portland area while opening offices … Read more
Join Cellebrite's experts as they discuss how to work remotely in the current climate.
What can you expect from a CTF experience, and what do you need to participate? Bring your own box (BYOB) and find out!
The summer has been a busy one for standards-setting organizations in the United States and European Union.
Welcome to a deep dive into the Windows 10 activity timeline, with Dr. Vico Marziale and Julie O'Shea.
Hello everyone and thank you for joining us. My name is Eddie Yandle, I’m Director of Marketing at Cellebrite. And we are here today for a discussion about dealing with the visual deluge in law enforcement.
In recent weeks the DFIR community has increasingly begun to speak out under the hashtag #DFIRforGood following conference presentations by leaders in digital forensics and information security.
Timelines have become a mainstay of digital forensic analysis in both public and private sectors. They help to explain what was happening on a given device or set of devices during a cybersecurity incident, a crime, a collision, or other event.
Impostor syndrome is a common topic on LinkedIn and other professional online career communities, but it seems especially poignant among digital forensics analysts, who frequently work 9-5 Monday to Friday viewing things that no human eye should ever have to witness for the vast majority of the working life.
Latest Forum Posts
Most GUID's generated in Windows are V1, see: So y...
By jaclaz, 21 hours ago
Just a quick note to let everyone know that a new book, “Forensic Discovery”, by Dan Farmer and Wietse Venema is now available from Amazon.com (ISBN 020163497X). For some reason it appears to be listed under the title “Internet Security” … Read more
A New Zealand computer forensics expert is helping American investigators gather evidence against the woman accused of murdering a pregnant Missouri woman and kidnapping her unborn child. Daniel Ayers, of McCallum Petterson in Auckland, was approached by an FBI-sponsored forensic … Read more
The U.S. Department of Defense (DOD) is making changes to streamline its response to online threats across the various branches of the military, and deal with a steady stream of new online woes, from hacking attempts to child pornography and … Read more
In Montgomery County’s (US) computer forensic department, Det. Ray Kuter’s workload has grown steadily during the past four years. Kuter heads the forensic laboratory. Computer forensic analysis has come of age in recent years and is now routinely performed to … Read more
Problems encountered in daily life often spawn new business concepts. But few problems are as severe as those encountered by Brady Essman, the 36-year- old president, CEO and founder of digitalmedix, an Englewood-based data retrieval and computer forensics firm. Essman’s … Read more
The time may come when you need to examine a hard drive either because you need to recover some lost data or because you suspect an employee of a violation. Whether you intend to use your findings in court, for … Read more
The last 12 months have seen a dramatic growth in almost every security threat that plague Windows PCs. The count of known viruses broke the 100,000 barrier and the number of new viruses grew by more than 50%. Similarly phishing … Read more
Kansas City, Mo. â€” First, they testified that a suspect in a Douglas County murder searched the Internet for terms including “How to murder someone and not get caught.” Then they used computer records to find the Kansas woman suspected … Read more