Thursday, October 10 2024
dfm-41

Intelligent Investigation Procedures

Brian Cusack discusses why ensuring compliance is not enough during investigations and what happens when the investigation uncovers matters beyond the scope.

Hide Data in NTFS

Regular author Rick Leinecker explains how to find openings in NTFS volumes where you can safely hide data.

Ransomware: Attack Techniques and Countermeasures

Nihad Hassan looks at ransomware, and how to defend against it in both individual and enterprise context.

Setting Professional Standards for Cyber Risk Management

Why there is a need for recognition of professionals and for the assurance of a quality professional standard.

How Quantum Computing will change Digital Forensics

Roger Grimes takes a look at Quantum Computing and the rise of the First Quantum Forensic Investigator.

The Cyber Supply Chain

An in-depth look at the Cyber Supply Chain and methods to deal with the increasing complexity.

Plus all the regular features......

Read Now

 

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading