Search Results for: Digital Forensic Blog Post Digital Forensics: Phases and Importance February 14, 2022 Digital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it... Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It... Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Blog Post 2021 NYCFE Fraud Conference October 26, 2021 Cyber insurance claims and compliance session will explore cyber insurance claims from the point of view of potential fraud issues... Blog Post Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would... Blog Post Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... Blog Post How to Use Sysinternals for Cyber Security June 24, 2021 Sysinternals is a free suite of cybersecurity tools for Windows users that help you manage, troubleshoot, and diagnose your Windows... Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests.... Blog Post SecurityScorecard acquires LIFARS to establish a DFIR services practice February 7, 2022 Our world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue... Blog Post The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities.... Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first... Page Short – Term Incident Response and Digital Forensics Retainer March 22, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult... Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
Blog Post Digital Forensics: Phases and Importance February 14, 2022 Digital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it...
Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It...
Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Blog Post 2021 NYCFE Fraud Conference October 26, 2021 Cyber insurance claims and compliance session will explore cyber insurance claims from the point of view of potential fraud issues...
Blog Post Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would...
Blog Post Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search...
Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
Blog Post How to Use Sysinternals for Cyber Security June 24, 2021 Sysinternals is a free suite of cybersecurity tools for Windows users that help you manage, troubleshoot, and diagnose your Windows...
Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests....
Blog Post SecurityScorecard acquires LIFARS to establish a DFIR services practice February 7, 2022 Our world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue...
Blog Post The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities....
Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first...
Page Short – Term Incident Response and Digital Forensics Retainer March 22, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult...
Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...