Because people have behavioral characteristics, the Silver Tail Forensics 3.0 - latest incarnation of this fine tool - can catch and stop them while providing analytical capabilities for forensic analysts.
The ability by organizations to collect mountains of data offers a dream scenario for hackers, but if managed properly, large volumes of information also can present IT staff with unique and valuable insight into an organization's security posture.
Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.
James Holderman, chief judge of the U.S. District Court in Chicago, is working to improve the e-discovery process for lawyers and IT teams at a time when digital evidence has never been so prolific.
This month, the focus is on analysis. We look at the network through the lens of the SIEM, and we look at digital incidents and cybercrime through digital forensics.
Networking forensic investigators must be equipped with the right tools - and freedom - to do their jobs right.
Counterintelligence: The new mission of IT departments everywhere? Lock down your business travelers for under $10.
Is a sting merely legitimized social engineering? Why cops don't have to tell you they're cops - online or off.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure