dfm covers
Written by Matthew Rahman

Digital Forensics Magazine is now worth (ISC)2 CPE Points

Digital Forensics Magazine, one of the leading resources for IT security specialists the world over, is now participating in the (ISC)2 CPE  attribution programme for CISSP members...


 Read more

Digital Forensics Magazine, one of the leading resources for IT security specialists the world over, is participating in the (ISC)2 CPE attribution programme for CISSP members. As result, all new subscribers to Digital Forensics Magazine will receive 5 CPE points towards their annual CISSP accreditation.

Matt Rahman, Marketing Director said, "This is a great opportunity for us and one that our potential (ISC)2 subscribers are sure to welcome. The chance to get additional CPE points is just another advantage of subscribing to DFM. We are really please to be particpating with (ISC)2 on this programme."

In order to receive your CPE points, subscribers are requested to enter their CISSP or SCCP membership number during the subscription process and they will be credited with the relevant CPE points. Subscriptions to Digital Forensics Magazine, one of the foremost resources for the IT security specialist and forensics practitioner, start at under £30 for the digital version.

For more information please visit www.digitalforensicsmagazine.com


About Digital Forensics Magazine
Digital Forensics Magazine is the flagship publication produced by TR Media, who specialize in publishing academic quality consumer magazines and books for the information security sector. Digital Forensics Magazine combines the depth and research of the best academic journals with the more traditional consumer feel of a trade magazine. It published its first issue on November 1st 2009. For more information, please visit www.digitalforensicsmagazine.com/media

About (ISC)2
(ISC) is the largest not-for-profit membership body of certified information security professionals worldwide, with over 66,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC) issues the Certified Information Systems Security Professional (CISSP) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP), Certification and Accreditation Professional (CAP), and Systems Security Certified Practitioner (SSCP) credentials to qualifying candidates. (ISC)'s certifications are among the first information tech nology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC) also offers education programs and services based on its CBK', a compendium of information security topics. More information is available at www.isc2.org

Please make cache directory writable.

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Dr Tim Watson

Dr Tim Watson is the head of the Department of Computer Technology at De Montfort University


Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 41 on sale from November 2019:

Forensic Syntactical & Linguistic Investigation

Mark Iwazko presents a case study regarding a Forensic Syntactical & Linguistic investigation: Instructed by the Moscow General Council of one of the actual big four accountants. Read More »

Forensic Readiness: A Proactive Approach to Support Forensic Digital Analysis

An increasing number of criminal actions are inflicting financial and brand damage to organizations around the globe. An impressive number of such cases do not reach the courts, mainly because of the organization’s inefficiency to produce robust digital evidences that are acceptable in the courts of law. Read More »

Subscribe today

Using Error-Patterns for Attribution: An Applied Linguistics Technique

Corpus Linguistics within Second Language Acquisition has developed models of error patterns made by defined groups of second language learners. This knowledge base can be leveraged by a knowledgeable analyst to attribute content to a subset of authors. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue