“Catalyst has long been recognized as an e-discovery industry leader providing the world's fastest and most powerful document repositories for large scale discovery and regulatory investigations,” ...
In previous articles, I’ve discussed log management and incident response in the age of compliance. It’s time to cover a separate topic that has connections to both log analysis and incident ...
Recently, Haworth walked CSO through her checklist for a forensics expedition. Forensics system: A cross between a laptop and a desktop computer, this device is used to boot up one hard drive and send ...
Listen to the Computerworld TechCast: Computer Forensics. The television series CSI has given millions of viewers an appreciation of the role and importance of physical evidence in conducting criminal ...
Computer scientist David Collins has probably spent more time messing around with the Microsoft XBox, other gaming consoles, and PDAs in the name of forensic science than anyone else in the world. But ...
The log data you collect from your systems and devices may seem pretty mundane. However, it could contain the precise evidence needed to investigate and successfully prosecute a crime. In order for ...
It is possible to trace users sharing unlicensed music files through their IP address, the Federal Court was told today by the major music labels' first witness in their civil case against ...
Australian university students have developed a Linux-based data-forensics tool to help police churn through a growing backlog of computer-related criminal investigations. The tool, developed by ...
A Solano County prosecutor called seven witnesses on the fourth day of a second jury trial for a former California Highway Patrol sergeant accused of downloading and sharing child pornography but the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results