dfm covers
 
 
Written by Matthew Rahman

Digital Forensics Magazine is now worth (ISC)2 CPE Points

Digital Forensics Magazine, one of the leading resources for IT security specialists the world over, is now participating in the (ISC)2 CPE  attribution programme for CISSP members...

 

 Read more



Digital Forensics Magazine, one of the leading resources for IT security specialists the world over, is participating in the (ISC)2 CPE attribution programme for CISSP members. As result, all new subscribers to Digital Forensics Magazine will receive 5 CPE points towards their annual CISSP accreditation.

Matt Rahman, Marketing Director said, "This is a great opportunity for us and one that our potential (ISC)2 subscribers are sure to welcome. The chance to get additional CPE points is just another advantage of subscribing to DFM. We are really please to be particpating with (ISC)2 on this programme."

In order to receive your CPE points, subscribers are requested to enter their CISSP or SCCP membership number during the subscription process and they will be credited with the relevant CPE points. Subscriptions to Digital Forensics Magazine, one of the foremost resources for the IT security specialist and forensics practitioner, start at under £30 for the digital version.

For more information please visit www.digitalforensicsmagazine.com

++ENDS++

About Digital Forensics Magazine
Digital Forensics Magazine is the flagship publication produced by TR Media, who specialize in publishing academic quality consumer magazines and books for the information security sector. Digital Forensics Magazine combines the depth and research of the best academic journals with the more traditional consumer feel of a trade magazine. It published its first issue on November 1st 2009. For more information, please visit www.digitalforensicsmagazine.com/media

About (ISC)2
(ISC) is the largest not-for-profit membership body of certified information security professionals worldwide, with over 66,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC) issues the Certified Information Systems Security Professional (CISSP) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP), Certification and Accreditation Professional (CAP), and Systems Security Certified Practitioner (SSCP) credentials to qualifying candidates. (ISC)'s certifications are among the first information tech nology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC) also offers education programs and services based on its CBK', a compendium of information security topics. More information is available at www.isc2.org

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 34 on sale from February 2018:


Device Forensics in the Internet of Things

As more businesses and consumers adopt IoT devices, privacy violations and cyber-attacks by malicious actors will become commonplace due to the insecure IoT infrastructure. Read More »

Data Destruction In Current Hard Disks & Data Destruction Techniques

Data destruction is a process traditionally applied using physical techniques, aiming at the completely destruction of the hard disk, however, there is an increasing interest in the use of logical techniques for data destruction, that allow reusing the physical device. Read More »

Subscribe today


Faster Searching For Known Illegal Content

Cryptographic (“MD5”) hash searching for known illegal material is one of the most thorough methods of digital forensic investigation. However, the technique is hampered by the ever-increasing size of media being examined, and the size of the hash list being searched. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue