by aliduveen | Aug 20, 2018
As Amazon AWS becomes more prevalent within organisations, there has been a significant rise in AWS breaches. Due to how quick AWS deployments can be, where virtual machines can be spun-up in quick succession, migrating from development into production environments is...
by aliduveen | Aug 14, 2018
Triaging is useful to quickly determine which digital devices have contraband, intelligence, or evidence. You can the prioritize your efforts on those devices first. Autopsy has a variety of features that are targeted at triage and this talk will show you what they...
by aliduveen | Aug 14, 2018
RegRipper has been available for a decade, and most analysts still run the tool via the GUI, using the default profiles. There are a number of valuable tips for getting the most from the tool, to further your investigation, or even open new doors in your...
by aliduveen | Aug 14, 2018
Insiders pose a unique threat by virtue of their knowledge of, and access to their employers’ systems and data. Because insiders’ everyday activity requires legitimate use of this knowledge and access, relying on anomaly detection alone to distinguish...
by aliduveen | Aug 14, 2018
Data recovery based on carving technique has been widely used and a lot of tools including commercial products have the capability to do. The basics of carving technique rely on a file header and footer, then extract the blocks between these two boundaries. As you...