by Tom | May 9, 2018 | Blog
Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are...
by Tom | Jan 29, 2018 | Blog
Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events. Mirai Mirai was a malware strain that creates a botnet out of...
by Tom | Sep 18, 2017 | Blog
Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute...
by Tom | Sep 8, 2017 | Blog
In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet....
by Tom | Mar 27, 2017 | Blog
When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals–but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned...