I believe the preparation phase of a digital search is the most important because it determines whether evidence will meet…
Digital forensics are. Here are some ways that data can be hidden within storage media : Example 1: Deleted Files…
Back in October, we were asked to analyze significant events that impacted critical infrastructure in 2016. I reviewed publicly available…
My most recent Tripwire State of Security Blog post is about communication skills for academic excellence and how it translates…
One of my first graduate research papers was about cyber attacks against critical infrastructure. After that, I became passionate about…
Our weekly course module introduced us to layer 2 attacks, specifically MAC & ARP attacks. I added to the discussion…
A recent case study required students to provide recommendations for addressing security in the overall technical design of a fictitious company…
Are you planning to take the CISSP exam? If you are considering taking the leap, please understand that this is…