forensics
Sometimes people ask me for career advice related to information security in general and, more specifically, digital...Read more
In the field of IT in general and digital forensics in particular, you become obsolete the moment you stop learning. Here...Read more
This post, published in February 2015, now captures a historical perspective at the term Indicators of Compromise (IOCs),...Read more
I had the pleasure of speaking with Jake Williams, my colleague at SANS Institute, about his perspective on various...Read more
Incident responders and forensic investigators need to be careful when using 32-bit tools to examine file system artifacts...Read more
The field of digital forensics and incident response (DFIR) is attracting a lot attention among information security...Read more
Some time ago I wrote about the importance of deliberate practice for developing information security skills. Practice is...Read more
Mandiant’s free Redline tool is designed for “triaging hosts suspected of being compromised or infected while...Read more
I speak with a lot of security professionals who are seeking to enter or grow in the field of digital forensics and...Read more
When analyzing malware discovered during a security incident, the investigator often formulates indicators of compromise...Read more