Skip to content

Digital Forensic Process—Preservation / Collection

By John Ahearne, Forensic Analyst This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Digital Forensic Process—Introduction Digital Forensic Process—Identification Handling Digital Evidence Handling of evidence…

Digital Forensics Process—Identification

  By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics Identification is an extremely important first step in the forensic examination process. It directly impacts efforts to develop a plan of action and ultimately the success of the project. It also allows the customer to control cost. Identification Before…

Digital Forensic Process—Introduction

By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics More and more aspects of our daily lives are being monitored, tracked and recorded by electronic devices. Today, computers, smartphones and tablets can be found in almost every home and have already become obvious sources of electronically stored information (ESI)…

Cybercrime Forecast: Upswing in 2017

By Michael Hall, Chief Information Security Officer   Computer security threats aren’t going away this year. They’re going to get worse. And, they’re likely to create bigger and nastier problems for big and small companies alike as hackers create new pathways into even highly secure environments. Google the term “security…

Proposed Encryption Legislation and What it Means

By Scott Moyer, DriveSavers President Unless you are just this moment rejoining society after months spent stranded on a technology-free desert island, you are well aware of the recent controversial disagreement between the FBI and Apple involving an iPhone 5C that once belonged to San Bernardino shooter, Syed Rizwan Farook…

Back To Top
Search