Because people have behavioral characteristics, the Silver Tail Forensics 3.0 - latest incarnation of this fine tool - can catch and stop them while providing analytical capabilities for forensic analysts.
The ability by organizations to collect mountains of data offers a dream scenario for hackers, but if managed properly, large volumes of information also can present IT staff with unique and valuable insight into an organization's security posture.
Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.
James Holderman, chief judge of the U.S. District Court in Chicago, is working to improve the e-discovery process for lawyers and IT teams at a time when digital evidence has never been so prolific.
This month, the focus is on analysis. We look at the network through the lens of the SIEM, and we look at digital incidents and cybercrime through digital forensics.
Networking forensic investigators must be equipped with the right tools - and freedom - to do their jobs right.
Counterintelligence: The new mission of IT departments everywhere? Lock down your business travelers for under $10.
Is a sting merely legitimized social engineering? Why cops don't have to tell you they're cops - online or off.
Sign up to our newsletters
SC Magazine Articles
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- More than 440K new Android malware strains found in Q1, study finds
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised
- FireKeepers confirms breach, says about 85,000 cards and other info are at risk
- Plex video sharing customers left at risk after hack attack
- Former Georgia-Pacific sysadmin charged with damaging protected computers
- Harvard University announces network intrusion, possible data exposure
- Saboteurs leverage RIPv1 for DDoS reflection attacks