Digital Forensics & The Fraud Triangle
Nick Miter looks at how forensic software applications predict fraud and corruption using heuristics.
Cracking MS-CHAP2
A look at the MS-CHAP2 network authentication protocol designed by Microsoft back in the days of NT4.0
Cloud-Based Honeypots
Introducing a tool for the forensic practitioner’s toolbox.
First Responders CSIRT & Forensics
A look at the requirements for a First Responder CSIRT
Creating A Virtual Forensics Lab
How to build a lower cost and scalable forensics lab
Improving Security Monitoring Analytics
How to improve SOC Analytics and overall security.
Developing a Tool to Speed Disk Scanning
The problems of the full forensic imaging of a physical storage device and some likely solutions.
Certificate Management
Calum MacLeod outlines the key steps to safeguard your business from disaster.
Covert Channels
Stealing information, command and control servers talking to bots and battle damage assessment.
Plus all the regular features......