MSAB Joins CASE Initiative On Digital Forensics

MSAB, the global leader in mobile forensic solutions, today announced that the company has joined other industry leaders to work collaboratively on the Cyber-Investigation Analysis Standard Expression (CASE) initiative.  CASE is a community-developed specification language or standard designed to serve a broad range of cyber-investigation domains, including digital forensic science, incident response, counter-terrorism, criminal justice, forensic intelligence and situational awareness.

The CASE Initiative began in 2015 at the U.S. Department of Defense Cyber Crime Center (DC3).  The standard was released as open source in 2017 and its adoption grew following a meeting at Europol’s European Cybercrime Centre. The primary motivation for CASE is interoperability - to advance the exchange of cyber-investigation information between tools and organizations.

Digital forensic specialists routinely use software tools to extract, parse and analyze information on a hard drive or a mobile phone. Today, it is often difficult to aggregate the digital information in a standardized way. For every tool available, investigators have to match the extracted data with the tool specifications, making the process time-consuming and costly. CASE supports automated normalization, combination, correlation and validation of information, enabling investigators to spend less time parsing and aggregating data and more time analyzing.

“We welcome the chance to work with other organizations and technology providers to modernize the digital forensics processes that exist today,” said Joel Bollö, MSAB CEO.  “Criminal enterprises and other threat actors are becoming more sophisticated in using mobile devices, the Internet of Things, encryption and new apps. Collectively we will all be strengthened by helping the digital intelligence community work together more effectively and share information more easily.”

In addition to MSAB, other participants in the CASE Initiative include the U.S. National Institute of Standards Technology (NIST), the U.S. Department of Defense Cyber Crime Center (DC3), Europol’s European Cybercrime Center (EC3), governments and law enforcement agencies, industry peers, and academic institutions.

GlobalNewswire:

You Might Also Read:

Police Are Mishandling Digital Forensic Evidence:

Digital Forensics, Incident Response & Attribution:

 

« The Five Most In-Demand Cybersecurity Roles
Can Russian Hackers Be Stopped? »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Exec

Cyber Exec

Cyber Exec is an executive search firm dedicated to global talent acquisition in Cyber Security, Information Technology, Defense...

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Elavon

Elavon

Elavon is a leader in secure payment processing solutions for customers,from large worldwide enterprises to locally-owned small businesses.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

Myra Security

Myra Security

The fully automated Myra DDoS Protection reliably protects web applications, websites, DNS servers, and IT infrastructures.

Aiuken Cybersecurity

Aiuken Cybersecurity

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

Quantum Security Solutions (QSec)

Quantum Security Solutions (QSec)

QSec is an innovative information security consultancy based in Ghana. We can provide your organisation with information security products and services that assure against information risk.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.