Gaining Better Control of Information Security Risk
Brian Cusack looks at the 2022 ISO/IEC 27002. The updated and revised international standard the ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection Information security controls was published earlier this year, and after a minor amendment, delivers 96 security controls that are clustered into four themes.
Techniques and Tools for Logs Forensic Analysis
Some of the most important digital evidence in any forensic investigation lies within the logs. Many devices and systems store important information in text files, called logs (operating systems, web servers, email servers, firewalls, routers, …). In this article Juan Torres Ibanez, we will explain the tools and techniques for logs analysis, applied to forensic and incident response investigations.
Atomic Time, Accurate Timekeeping, and NTP For Investigative Needs
In this article, we examine the needs, issues and technologies associated with keeping accurate network time. Critical not only for business needs but for everyone relying on technology, we will also look at a novel approach developed by the author to gauge the network time accuracy of local and remote networks using email.
Plus all the regular features......