Network Access Control (NAC) is one of the longest standing and most effective security technologies in the industry.
Browsing: Forensic
The advent of successful Cyber Crimes has driven their increased focus upon CSIRT, First Responder Capabilities, and the application of Digital Forensics.
The Windows XP debate is an interesting one, and when one considers there are significant numbers of clients still installed
Unlike the traditional ‘stop-start’ approach to vulnerability management driven by snapshot scans, continuous detection and mitigation of vulnerabilities
‘Did I tell you that I was a Brain Surgeon? – Yes I am – I paid $550 [US] took a weekends course, and now I am ready to operate on any passer-by.
In this article I am referring to this as OSINT, and an established process of a Security Triage to discover what you don’t know
At its simplest, eDiscovery is a term used to describe actions taken to collect, sort, identify and understand information stored on computers
The only question they had was ‘who had leaked this information from the plant’ a question I can attest was never satisfied.
Willie Sutton responded when asked why he robbed banks, his simple and eloquent answer was ‘Because that’s where the money is’.
It is looking like the new Bahrain CyberCrime law is going to set the demographic bar for those Hackers and Hacktivists who are found to be culpable