Thursday, October 10 2024
DF25-cover

Forecasting the Business Impact of Security Control Selections

What value do security control frameworks give? Brian Cusack takes a look at how to improve the security control framework value.

Digital Forensic Readiness Revisited

Ivan Claims takes a look at the nine major domains that every digital forensics readiness framework must have and why they matters.

A Deception Tool To Improve Security

In this final article in the series, Haider al-Khateeb and his students demonstrate how their sandbox implementation (the Virtual Honeynet) draws upon deception to potentially learn from the black hat community and improve security.

Modified Bloom Filter Case Studies

Richard Carbone continues his series on modified bloom filters by examining two real world examples.

Providing DDoS Protection

Using a real world case study, Dave Larson explores how DDoS attacks are being used as a deception tool to hide more sinister attacks.

Digital Forensics and SFIA

Matthew Burrows explains the skills framework for the information age. SFIA Version 6 has been released and includes digital forensics and penetration testing.

Graph Technology & Fraud

Graph databases are a powerful addition to any Chief Security Officer’s arsenal, and to any forensic accountancy or regulatory body. Emil Eifrem walks us through how they can be used to detect fraud.

Understanding Heuristic-based Scanning vs. Sandboxing

The threat landscape is challenging for signature-based detection with
an ever-increasing number of threats and the shortened duration time for the effectiveness of a single signature variation. Curtis Cade takes a look.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading