Line of Business

Targeted DFIR evidence collections

Targeted DFIR evidence collections

During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…

September 30, 2022 5 minutes read
Using the Generic SQLite Database Parser EnScript in forensic examinations of a mobile device

Using the Generic SQLite Database Parser EnScript in forensic examinations of a mobile device

In my previous blog, the use of EnScript was introduced as a benefit to extend the artifact reach and add custom parsing for the yet…

September 30, 2022 5 minutes read
The ‘low code revolution’ is improving service delivery in Public Sector

The ‘low code revolution’ is improving service delivery in Public Sector

In 2020, five years’ worth of digital adoption for citizens and businesses happened in about eight weeks. Government agencies worldwide were able to pivot to 100% digital…

September 30, 2022 5 minutes read
Why cloud migration is key to public sector success

Why cloud migration is key to public sector success

In the public sector, cloud deployment is increasingly becoming a key enabler for digital transformation. Governments are looking to meet citizen expectations for convenient, digital…

September 29, 2022 5 minutes read
Civil servants are the key to building trust in government

Civil servants are the key to building trust in government

Governments throughout the world are stepping up efforts to modernize digital services to citizens. For example, in the U.S., executive order 14058 on Transforming Federal…

September 28, 2022 6 minutes read
Time to take a closer look at SPS Commerce reviews

Time to take a closer look at SPS Commerce reviews

When looking for SPS Commerce reviews, we’ve noticed that SPS is markedly absent from leading analyst reports, such as Gartner and IDC. We understand, therefore,…

September 28, 2022 4 minutes read
Network security: from reactive alerts to proactive threat hunting

Network security: from reactive alerts to proactive threat hunting

In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending your network as you would…

September 27, 2022 4 minutes read
Affix cyber resilience to your Managed Services

Affix cyber resilience to your Managed Services

Managed Service Providers (MSPs) are a major target for cyber attacks and should consider adding Managed Detection and Response (MDR) for cyber resilience. Research shows…

September 27, 2022 3 minutes read
Mobile device examination with EnCase

Mobile device examination with EnCase

Anyone engaged in DFIR (Digital Forensics & Incident Response) will recognize and understand the field moves and evolves at a rapid rate. There is always…

September 27, 2022 4 minutes read
 Transitioning to a sustainable energy future

 Transitioning to a sustainable energy future

Around the world, energy costs are spiking to record-high prices and aren’t expected to subside anytime soon. In fact, according to the World Bank, the…

September 26, 2022 4 minutes read
Put simply, digitization combats deforestation

Put simply, digitization combats deforestation

I think we can all agree that paper has had a pretty good run. It’s been around for thousands of years and has changed the…

September 22, 2022 5 minutes read
Four reasons to make eDiscovery in the cloud work to your advantage   

Four reasons to make eDiscovery in the cloud work to your advantage   

The general benefits of cloud computing are well understood by CIOs and business unit owners. That is, they can trade fixed capital (infrastructure) expenses for…

September 21, 2022 4 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.