- Home
- Technology
- Forensics
Forensics
The Latest News
-
Article
Anthem Attribution to China: Useful?
Report Links Breach to Chinese Professor; Experts Respond By Mathew J. SchwartzA new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?
-
Article
Paris Attacks: The Cyber Investigation
Digital Forensics Critical to the Case, Experts Say By Eric Chabrow and Mathew J. SchwartzFrench authorities continue to investigate the Jan. 7 attack in Paris that claimed the lives of a dozen, including journalists and police officers. Information security experts say that cyber-forensic skills are crucial for finding the perpetrators.
-
Article
Overcoming the Cloud Forensic Challenge
Why Conventional Approaches Don't Work in the Cloud By Eric ChabrowA challenge examiners face in conducting forensic investigations in the cloud is that they don't have access to the servers. That's just one problem the National Institute of Standards and Technology is addressing.
-
Article
Nasdaq Hack Attribution Questioned
Culprit and Motive Still Remain Unclear By Mathew J. SchwartzTwo zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.
-
Article
NIST Updating Mobile Forensics Guidance
Significant Tech Changes Challenge Forensic Examiners By Eric ChabrowWhen NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
White Papers
-
Mobile Remote Deposit Capture: Balancing Fraud Prevention and Customer Convenience
For banks with strong mobile offerings, the huge demand for mobile RDC services is a major opportunity to win new customers. However, the increased usage of mobile RDC services can also increase...
-
The Future of Fraud Prevention - User Behavior How to Stop Fraudsters from Wreaking Havoc with Your Online Assets
Learn how to stop fraudsters from wreaking havoc with your online assets User Behavior Analytics (UBA) is the future of fraud prevention. Once only valued by early adopters, UBA has entered the...
-
Seven Steps to Software Security
Understanding technical security risk begins with knowing how and where vulnerabilities occur within an organization. These vulnerabilities are the gateway that malicious actors use to circumvent...
Webinars
-
Healthcare Information Security Today: 2015 Survey Results and Analysis
What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead? Join us for this webinar that will provide answers.
-
Security Alerts: Identifying Noise vs. Signals
For anyone working in a security operations center, this is a familiar picture: lots of alerts, but not enough analysts; too many disparate tools to manage effectively; not enough visibility, and too...
The Syrian Electronic Army hacker collective has claimed credit for hacking into an advertising...
Latest Tweets and Mentions
The Syrian Electronic Army hacker collective has claimed credit for hacking into an advertising...
The ISMG Network
-
Webinar
I Found an APT: Now What? Operationalizing Advanced Threat and Breach Response
-
Article
Bill Altering Privacy Rule Advances
Legislation Is Designed to Boost Medical Research, Innovation
-
Article
Sally Beauty Confirms Second Breach
Retailer's Investigation of 'Illegal Intrusion' Continues
-
Interview
Art Coviello: Venture Capitalist
Ex-RSA Chairman Joins Rally Ventures as Partner
-
Article
House Votes to Ban NSA Bulk Collection
USA Freedom Act Passes by Wide Margin
-
Article
FTC's LabMD Case: The Next Steps
Commission Won't Call Rebuttal Witness
-
Article
The Challenges of Securing Smart Cities
Middle Eastern, Asian Leaders Align with Security Frameworks
-
Interview
Qatar Builds on Information Assurance
QCERT's Ismael on How IA Helps CISOs Manage Risks
-
Blog
Government Critic Gets White House Role
Princeton Professor Ed Felten Is New Federal Deputy CTO
-
Interview
Saudi Banks: Lessons from Attacks
Banque Saudi Fransi's Osman on Responding to Top Threats