dfm covers

In This Issue

Written by DFM Team

Issue 49 - Out now!

Here's a quick review of some of the main articles within Issue 49

Issue 49 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 49...

Gaining Better Control of Information Security Risk

Brian Cusack looks at the 2022 ISO/IEC 27002. The updated and revised international standard the ISO/IEC 27002:2022 “Information security, cybersecurity and privacy protection – Information security controls” was published earlier this year, and after a minor amendment, delivers 96 security controls that are clustered into four themes.

Techniques and Tools for Logs Forensic Analysis

Some of the most important digital evidence in any forensic investigation lies within the logs. Many devices and systems store important information in text files, called logs (operating systems, web servers, email servers, firewalls, routers, ...). In this article Juan Torres Ibáñez we will explain the tools and techniques for logs analysis, applied to forensic and incident response investigations.

Atomic Time, Accurate Timekeeping, and NTP For Investigative Needs  

In this article, we examine the needs, issues and technologies associated with keeping accurate network time. Critical not only for business needs but for everyone relying on technology, we’ll also look at a novel approach developed by the author to gauge the network time accuracy of local and remote networks using email.

An Introduction to Cryptography

We often hear or read about how encryption is a good thing if you are wanting to protect your own information/data, or a bad thing if you are Law Enforcement and want to get access to information/data as part of an investigation. We are not going to solve this paradox in this article, we will save the ethical discourse for a future article. In this article our Editor in Chief goes back to basics to look at cryptography, look at how it works and identify some of the use cases.


Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Angus Marshall

Angus Marshall is an independent digital forensic practitioner, author and researcher


Coming up in the Next issue of Digital Forensics Magazine

Solving the Security Challenges with a Human Firewall

The Next Generation Human Firewall, fully trained and ready to act on security threats with the right tools at their disposal needs to meet the needs of a securely distributed, flexible, integrated modern workforce.

Fraudulent Use of Digital Images and Detection Survey

This article looks at the basic concepts related to image forgery; the types, detection procedure algorithms and all possible techniques to detect malicious signatures including a comparative analysis.

Subscribe today

Discovery in the Cloud: An Investigator’s Close Look at Unexpected Risks and Challenges

Documents residing in cloud storage accounts are increasingly coming into scope in digital forensic investigations such as IP theft, regulatory, corruption, merger clearance and civil matters. Organisations may be obligated to place preservation holds on data residing in cloud storage, collect documents from cloud accounts and produce this data to regulators or courts.

Every Issue

News, 360, IRQ, Legal