Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

(IN)SECURE Magazine Issue 26 released

(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. Issue 26 has just been released. Download it from: http://www.insecuremag.com The covered topics include: – PCI: Security’s lowest common denominator – Analyzing Flash-based RIA components and discovering vulnerabilities – Logs: Can we finally tame the beast? – Launch […]

Digital Forensic Acquisition

One of the key aspects of conducting digital forensics pertains with the proper collection and authentication of the evidence. If the evidence is not collected properly, there is a very good chance the results of the examination will be questioned. Following digital forensic best practices, we typically conduct our examination on copies, often referred to as “forensic images” of the original evidence.

(IN)SECURE Magazine Issue 26 released

(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. Issue 26 has just been released. Download it from: http://www.insecuremag.com The covered topics include: – PCI: Security’s lowest common denominator – Analyzing Flash-based RIA components and discovering vulnerabilities – Logs: Can we finally tame the beast? – Launch […]

Digital Forensic Acquisition

One of the key aspects of conducting digital forensics pertains with the proper collection and authentication of the evidence. If the evidence is not collected properly, there is a very good chance the results of the examination will be questioned. Following digital forensic best practices, we typically conduct our examination on copies, often referred to as “forensic images” of the original evidence.