Security

Cybersecurity Services combat an APT with NDR

Attackers linked to Iran and China are actively targeting critical infrastructure.  Both the U.S. Environmental Protection Agency and National Security Agency have requested that each…

March 28, 2024 4 minutes read
Targeted DFIR evidence collections

Targeted DFIR evidence collections

During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…

September 30, 2022 5 minutes read
Using the Generic SQLite Database Parser EnScript in forensic examinations of a mobile device

Using the Generic SQLite Database Parser EnScript in forensic examinations of a mobile device

In my previous blog, the use of EnScript was introduced as a benefit to extend the artifact reach and add custom parsing for the yet…

September 30, 2022 5 minutes read
Network security: from reactive alerts to proactive threat hunting

Network security: from reactive alerts to proactive threat hunting

In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending your network as you would…

September 27, 2022 4 minutes read
Affix cyber resilience to your Managed Services

Affix cyber resilience to your Managed Services

Managed Service Providers (MSPs) are a major target for cyber attacks and should consider adding Managed Detection and Response (MDR) for cyber resilience. Research shows…

September 27, 2022 3 minutes read
Mobile device examination with EnCase

Mobile device examination with EnCase

Anyone engaged in DFIR (Digital Forensics & Incident Response) will recognize and understand the field moves and evolves at a rapid rate. There is always…

September 27, 2022 4 minutes read
NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors are known to drop HTML…

August 24, 2022 4 minutes read
What’s new in OpenText EnCase Endpoint Investigator

What’s new in OpenText EnCase Endpoint Investigator

August 2022: What’s new in EnCase Endpoint Investigator CE 22.3? As enterprises continue to face the challenges associated with cybersecurity threats that come from internal…

August 8, 2022 3 minutes read
What’s new in OpenText EnCase Forensic

What’s new in OpenText EnCase Forensic

August 2022: What’s New with EnCase Forensic v22.3 With the release of EnCase Forensic v22.3, digital forensic investigators can now take advantage of AFF4 functionality. …

August 8, 2022 2 minutes read
Increase security with customer-managed encryption

Increase security with customer-managed encryption

Organizations need a secure path to the cloud in a Zero Trust world. Concerns over security can be a barrier for organizations transitioning to cloud-based solutions….

August 4, 2022 3 minutes read
Enabling collaboration in digital forensic investigations

Enabling collaboration in digital forensic investigations

A customer recently told me they could be at search warrants every day of the year and never make a dent in their case load. That’s…

August 4, 2022 4 minutes read
Partnering with law enforcement to protect children

Partnering with law enforcement to protect children

Forty one years ago this week, Adam John Walsh was abducted from a Florida department store and murdered at just six years old.  As an outcome…

July 28, 2022 4 minutes read
Modernizing data collection with OpenText EnCase Information Assurance

Modernizing data collection with OpenText EnCase Information Assurance

In today’s digital world, business communications are evolving, and organizations are adapting to new modern work environments. Historically, data was located primarily on in-house workstations…

June 21, 2022 4 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.