Digital forensics

Results: 501



#Item
211Computing / Technology / Intel / Deconstruction / Critical theory

SANS Cyber Threat Intelligence Summit[removed]Feb 2nd, 2015

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:10
212Technology / Cloud clients / Malware / Android / IPhone / Backup / SMS / IOS / Tru / Smartphones / Software / Computing

Binary_Thumbprint_Magnified

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-08-04 10:19:02
213Open-source intelligence / Web development / Mashup / Computing / Kodama / World Wide Web / Web 2.0 / Collective intelligence

Maltego Kung-Fu Exploiting Open Source Threat Intelligence Matt Kodama VP Product [removed]

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:10
214

2015 CTI Survey Results Preview Michael Cloppert report author: Dave Shackleford

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:10
    215Forensic science / Heuristics / Knowledge / Computer forensics / Expert witness / Department of Defense Cyber Crime Center / Outline of forensic science / Digital forensics / Law / Criminology

    Job Bulletin Page 1 of 5 DAKOTA COUNTY Employee Relations

    Add to Reading List

    Source URL: www.htcia.org

    Language: English - Date: 2015-01-22 11:35:39
    216Network protocols / Media Transfer Protocol / Portable media players / Picture Transfer Protocol / USB mass-storage device class / Digital audio players / Universal Serial Bus / Windows Image Acquisition / Windows / Microsoft Windows / Computing / Computer hardware

    USB Devices and Media Transfer Protocol Identifying the Existence of Data Exfiltration Artifacts Nicole Ibrahim G-C Partners, LLC

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-06-11 17:22:54
    217

    Shelly Giesbrecht EVIL GENIUS Senior Security Operations Analyst Nexen Energy ULC. AGENDA

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-06-11 17:23:23
      218Kyle / Malware / Verizon Communications / Internet / Electronic engineering / Economy of the United States / Domain name system / Radio-frequency identification / Verisign

      Incident Patterns Kevin Thompson, Verizon Kyle Maxwell, Verisign SANS DFIR Summit 2014 Daniel Greis

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-06-11 17:23:11
      219Network architecture / Computing / Internet standards / Whois / Domain name / Name server / Computer network security / DNS hijacking / Google Public DNS / Domain name system / Internet / Internet protocols

      DNS as a Control Point for Cyber Risk DR . PAU L V I X I E February 3, 2015 FARSIGHT SECURITY, INC. - COMPANY CONFIDENTIAL © 2015

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2015-02-06 11:01:10
      220Cyberwarfare / Computer network security / Security / Penetration test / Hacker / Vulnerability / White hat / Exploit / Security testing / Software testing / Hacking / Computer security

      Incorporating Cyber Threat Intelligence into Security Assessment

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2015-02-06 11:01:11
      UPDATE