• How IT can prepare for mobile forensic investigations

    Posted October 16, 2012 - 9:50 pm

    If your IT security team must comply with regulations like PCI-DSS or HIPAA, you need to know who accesses your data and what they do with it, even if they're using a mobile device to do it. But performing forensic investigations on mobile devices is trickier than it is on PCs.
  • RSA looks to have SIEM do advanced real-time threat analysis, forensics

    Posted September 19, 2012 - 10:16 am

    RSA is readying a product it calls Security Analytics whose purpose is basically to transform the company's traditional security information and event management (SIEM) product, EnVision, into a hunter of stealthy attackers, and a forensics tool to analyze attacks.
  • Using logs for forensics after a data breach

    Posted November 10, 2010 - 2:48 pm

    Despite the best precautions, it is impossible to protect your network against every attack. When the inevitable happens, your log data can be critical for identifying the cause of the breach and collecting evidence for use in the legal system. That is, if your logs were properly configured before the breach happened.
  • 15 must-listen podcasts for security pros

    Posted July 1, 2010 - 7:52 am

    Want to keep up-to-date on the latest security trends -- without straining your eyes? Tune in to one (or several) of the 15 podcasts listed here.
  • Deleted Data Drives New Data Breaches

    Posted April 15, 2009 - 11:26 am

    According to a new report on data breaches from Verizon Business, cyber criminals are no longer attacking where the credit card files are, but where they once were.
  • P2V as a Part of Forensics

    Posted January 16, 2009 - 5:30 pm

    Recent VMware Communities forum discussions have brought Forensics to the fore once again. Even so it has made me think of using virtualization tools to do preliminary analysis -- something that could tell you if the time and effort of full acquisition is required.

  • VMworld and Forensics

    Posted September 23, 2008 - 11:29 am

    In discussions with backup companies about digital forensics I discovered some useful items. Specifically that full VMDK backups may be forensically sound and that there is a way to dump the memory of a VM before you kill it like pulling the plug.
  • More Thoughts on Forensics

    Posted August 13, 2008 - 5:55 pm

    How to preserve memory files of running VMs.
  • Thoughts on Forensics

    Posted August 11, 2008 - 3:59 pm

    Forensic Science has yet to catch up with the Virtualization Market. There are some aspects of Forensics that are possible today but when you talk about large virtual infrastructures with TBs of storage, forensics can be difficult to say the least. Here is some help to speed up gathering of a virtual machine for forensic analysis.
Join us:






Join today!

See more content
Ask a Question