Digital forensics

Results: 501



#Item
221

Company LOGO SuperSize Your Internet Timeline

Add to Reading List

Source URL: digital-forensics.sans.org

- Date: 2014-06-11 17:22:59
    222Alcoholic beverage / Drug culture / Prohibition

    State of Cyber Threat Intelligence Address Rick Holland, Principal Analyst Forrester Research, Inc. 02 February 2015

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2015-02-06 11:01:10
    223Intelligence / Collective intelligence / Open-source intelligence / Human intelligence / Military intelligence / Intelligence gathering disciplines / National security / Data collection

    Ruth Cuddyer, Lockheed Martin CIRT  Blind Spots  Ryan Stillions – Lack of visibility from info overload

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2015-02-06 11:01:10
    224Travel technology / Point of sale / Malware / PcAnywhere / ALOHAnet / Computing / Business / Technology / MICROS Systems

    The Anatomy of a Breach Smart security on demand Jonathan Spruill Senior Security Consultant, SpiderLabs © 2013 Trustwave Holdings, Inc.

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-06-11 17:23:27
    225Computing / System software / Data recovery / Information technology audit / Simson Garfinkel / Year of birth missing / Network forensics / The Sleuth Kit / Forensic Toolkit / Computer forensics / Computer security / Digital forensics

    d i g i t a l i n v e s t i g a t i o n[removed]S 6 4 eS 7 3 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin

    Add to Reading List

    Source URL: dfrws.org

    Language: English - Date: 2010-07-28 09:43:06
    226Computing / System software / Data recovery / Information technology audit / Simson Garfinkel / Year of birth missing / Network forensics / The Sleuth Kit / Forensic Toolkit / Computer forensics / Computer security / Digital forensics

    d i g i t a l i n v e s t i g a t i o n[removed]S 6 4 eS 7 3 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin

    Add to Reading List

    Source URL: www.dfrws.org

    Language: English - Date: 2010-07-28 09:43:06
    227Security / Computer security / Computer crimes / Secure communication / Hacking / Malware / Data breach / SurfWatch / Attack / Computer network security / Cyberwarfare / Cybercrime

    December Attacks Highlight Need for Good Vulnerability Management For the December 2014 Period Copyright © 2015 SurfWatch Labs, Inc. All rights reserved

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2015-02-06 11:01:09
    228Computer file formats / Portable Document Format / Computer file / MongoDB / MHTML / File system fragmentation / Computing / Data management / Shellcode

    Leveraging File Artifacts for Threat Intelligence SANS Cyber Threat Intelligence Summit 2014 Who’s This… Guy? • David Dorsey, Click Security, [removed]

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-02-18 18:49:31
    229Data management / System software / Filename / Computer file / Volume / Microsoft Outlook / Disk file systems / Computing / NTFS

    LET’S DO THIS • WIPED FILE METADATA RECOVERY VIA VOLUME SHADOWS • WHAT DO WE NOT HAVE? - SHELLBAGS AND EXTERNAL DRIVES • FILE CREATIONS VIA NON WINDOWS NTFS DRIVERS • DETERMINING WHAT ATTACHMENTS HAVE ACCESSED

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-06-11 17:23:23
    230

    Modern Incident Response Jeffrey J. Guy | 9 Jun 14 [removed] @jjguy ©2014 Bit9. All Rights Reserved

    Add to Reading List

    Source URL: digital-forensics.sans.org

    - Date: 2014-06-11 17:23:10
      UPDATE