I don’t believe that researchers should jeopardize their freedom or future for any organization. There is certainly value in having red team skills to become…
I published a 4 Part Series on sources that can be used to aid in digital forensics investigations. Part 1…
Introduction Digital forensics can be described as the science of identifying, extracting, and preserving computer logs, files, cookies, cache, meta-data,…
Cyber is not always sexy and fun, so today, let’s take a look at a term that keeps a lot…
The most damaging corporate computer crime today is hacking large companies that manage our nation’s critical infrastructure, such as electricity…
The most important cyber crime law available to law enforcement is the Computer Fraud and Abuse Act of 1986, commonly…