XTREMEFORENSICS

xtremeforensics.biz

The roots of XtremeForensics can be traced back to 1994 when the first version of what is now ILooK was being distributed to the intelligence community of MI-5 and MI-6 in the UK. Over the next few years ILooK was only available to a subscribed user base of Law Enforcement, Intelligence Services and the Military. By 2002 ILooK was being used in 67 countries and its development was being funded by various agencies in the US that included the FBI, the US Department of Defence and the Treasury Department. During the 9/11 trials all digital forensic evidence introduced into Federal Court was processed using ILooK. This year also saw the creation of Perlustro to manage a 6-year contract with the US Internal Revenue Service.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

news image

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More

Enterprise Security, Platform Security, Software Security

SANS INSTITUTE INTRODUCES VOLUME 3 OF THE ICS CYBERSECURITY FIELD MANUAL, FEATURING ACTIONABLE GUIDANCE TO PROTECT AGAINST EVOLVING THREATS

Prnewswire | May 15, 2023

news image

SANS Institute, the global leader in cyber security training and education, has announced the latest SANS ICS Cybersecurity Field Manual Volume 3, a continuation from Volumes 1 and 2, providing Industrial Control Systems (ICS) cybersecurity professionals and ICS risk managers with more advanced insights into industrial control system specific incident response, risk-based ICS vulnerability management, ICS defender skillsets, team management, and ICS security tools and protocols to defend t...

Read More

Software Security

BLACK KITE LAUNCHES AVIATOR PARTNER PROGRAM TO EXPAND DEPLOYMENT OF TRUSTED CYBER RISK RATINGS SOLUTIONS

Black Kite | August 20, 2021

news image

Black Kite, the trusted cyber risk ratings company, today launched the Black Kite Aviator partner program. Aviator enables IT solutions providers to bolster their portfolio of cyber risk services and help customers secure their supply chains. More than 50 companies have already signed on to the Aviator program. Aviator partner program members will have access to Black Kite's industry-leading platform that simplifies third-party risk management, leverages open-source intelligen...

Read More

Enterprise Security,Platform Security,Software Security

SWIMLANE LAUNCHES FIRST COMPREHENSIVE SECURITY AUTOMATION ECOSYSTEM FOR OT ENVIRONMENTS

Swimlane | November 15, 2022

news image

Swimlane, the low-code security automation company, today announced the formation of the first operational technology (OT) security automation solution ecosystem tailored to meet the combined OT and IT security requirements within critical infrastructure environments. The Biden Administration designated November as Critical Infrastructure Security and Resilience Month, drawing attention to the need for “fortifying our information technology and cybersecurity across sectors.&...

Read More
news image

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More
news image

Enterprise Security, Platform Security, Software Security

SANS INSTITUTE INTRODUCES VOLUME 3 OF THE ICS CYBERSECURITY FIELD MANUAL, FEATURING ACTIONABLE GUIDANCE TO PROTECT AGAINST EVOLVING THREATS

Prnewswire | May 15, 2023

SANS Institute, the global leader in cyber security training and education, has announced the latest SANS ICS Cybersecurity Field Manual Volume 3, a continuation from Volumes 1 and 2, providing Industrial Control Systems (ICS) cybersecurity professionals and ICS risk managers with more advanced insights into industrial control system specific incident response, risk-based ICS vulnerability management, ICS defender skillsets, team management, and ICS security tools and protocols to defend t...

Read More
news image

Software Security

BLACK KITE LAUNCHES AVIATOR PARTNER PROGRAM TO EXPAND DEPLOYMENT OF TRUSTED CYBER RISK RATINGS SOLUTIONS

Black Kite | August 20, 2021

Black Kite, the trusted cyber risk ratings company, today launched the Black Kite Aviator partner program. Aviator enables IT solutions providers to bolster their portfolio of cyber risk services and help customers secure their supply chains. More than 50 companies have already signed on to the Aviator program. Aviator partner program members will have access to Black Kite's industry-leading platform that simplifies third-party risk management, leverages open-source intelligen...

Read More
news image

Enterprise Security,Platform Security,Software Security

SWIMLANE LAUNCHES FIRST COMPREHENSIVE SECURITY AUTOMATION ECOSYSTEM FOR OT ENVIRONMENTS

Swimlane | November 15, 2022

Swimlane, the low-code security automation company, today announced the formation of the first operational technology (OT) security automation solution ecosystem tailored to meet the combined OT and IT security requirements within critical infrastructure environments. The Biden Administration designated November as Critical Infrastructure Security and Resilience Month, drawing attention to the need for “fortifying our information technology and cybersecurity across sectors.&...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us