TECHNOLOGY > Forensics


« Back to News

2018-06-06

Terrorists Deploy New Techniques To Counter Digital Forensics

Terror groups are using new and better techniques to hide data in computers and phones to reduce the intelligence value of seized laptops & phones.

2018-01-09

UK Police Give Cybercrime Warning

Hard drives stacked up waiting for analysis as cybercrime victims in N. Ireland face delays in police support as resources come under pressure.

2017-11-30

Replaying Crime Scenes With An Advanced Scanner

Canadian police forces use a forensic laser scanner capable of detecting the tiniest of details and recreate collisions and crime scenes in 3D.

2017-05-30

Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR

Smell. Sound. Digital Reconstruction: Crime scene investigators will soon be using a raft of new tools & analytical techniques.

2017-05-16

Microsoft, Kaspersky & Symnantec Weigh In On WannaCry Ransomware

Top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean Cybergang known as Lazarus Group.

2017-05-12

Cybersecurity Has A Metrics Problem

Building security metrics, measuring risk and improving cyber incident communications in your organisation aren’t “one and done” processes.

2017-04-12

Ransomware 'customer support' Chat Reveals Criminals' Ruthlessness

Held to ransom by cyber extortionists? You might get easy payment terms, but absolutely no discount.

2017-03-22

New Malware Hides In Memory

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.

2017-03-21

A Common Language For Sharing Intelligence On Cybersecurity Threats

Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn

2017-03-24

Stealthy Malware Is Going Mainstream

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Web Security News

Web Security News

Web Security News is a digest of important security announcements and events about web application security techniques and strategies.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risks insurance.

Gulf Information Security Expo & Conference (GISEC)

Gulf Information Security Expo & Conference (GISEC)

GISEC is the foremost cyber security conference in Asia, the Middle East and Africa.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

Electronic Security Service (ESS)

Electronic Security Service (ESS)

ESS is a coordinating state authority, which provides coordination of the activity of the entities of information infrastructure in Azerbaijan.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

Cyber Wales

Cyber Wales

Cyber Wales is a flourishing cybersecurity ecosystem in Wales encompassing business, academia, government and cyber defence.

Albany Investment

Albany Investment

Albany Investment is a leading UK investment advisory. We specialise in Foreign Direct Investment into specialist areas including the first UK Cyber Security Fund.