Intelligent Investigation Procedures
Brian Cusack discusses why ensuring compliance is not enough during investigations and what happens when the investigation uncovers matters beyond the scope.
Hide Data in NTFS
Regular author Rick Leinecker explains how to find openings in NTFS volumes where you can safely hide data.
Ransomware: Attack Techniques and Countermeasures
Nihad Hassan looks at ransomware, and how to defend against it in both individual and enterprise context.
Setting Professional Standards for Cyber Risk Management
Why there is a need for recognition of professionals and for the assurance of a quality professional standard.
How Quantum Computing will change Digital Forensics
Roger Grimes takes a look at Quantum Computing and the rise of the First Quantum Forensic Investigator.
The Cyber Supply Chain
An in-depth look at the Cyber Supply Chain and methods to deal with the increasing complexity.
Plus all the regular features......