John Walker discusses the need for security professionals and MP’s to rise to the challenge of curtailing the spread of child abuse images online.
Browsing: Forensic
We still have a long way to go with BYOD, and there is a massive hill with regards to educating the public about using unsecured WiFi environments.
John Walker comments on common user behavior with respect to mobile devices and suggests that these tools deserve more respect and security awareness.
Career Academy is offering our readers exclusive access to their InfoSec and IT Certification Training All Access Pass. This is a limited time offer, so act now!
Phil Beckett of Proven Legal Technologies discusses ResPublica’s suggestion that bankers swear an oath to raise accountability in the industry.
Professor John Walker proposes that we should utilize the element of imagination to think as would a cyber criminal to locate security unknowns.
Phil Beckett, managing director at Proven Legal Technologies, considers the dangers of wiped smartphones.
Professor John Walker gives his reasoning for why he sees Richard Clarke as one of the most influential people in the infosec field over the past decade.
Though packet capture is great, it does have some limitations that need to be recognized for forensics.
Emulex study shows that 45% of IT staffs monitor network and application performance manually, instead of implementing proven network monitoring tools.