XTREMEFORENSICS

xtremeforensics.biz

The roots of XtremeForensics can be traced back to 1994 when the first version of what is now ILooK was being distributed to the intelligence community of MI-5 and MI-6 in the UK. Over the next few years ILooK was only available to a subscribed user base of Law Enforcement, Intelligence Services and the Military. By 2002 ILooK was being used in 67 countries and its development was being funded by various agencies in the US that included the FBI, the US Department of Defence and the Treasury Department. During the 9/11 trials all digital forensic evidence introduced into Federal Court was processed using ILooK. This year also saw the creation of Perlustro to manage a 6-year contract with the US Internal Revenue Service.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security

BD TO ADVANCE LEADERSHIP IN CYBERSECURITY TRANSPARENCY AND PREPAREDNESS

BD | June 07, 2021

news image

A leading global medical technology company, BD (Becton, Dickinson and Company), today announced that it has become the first medical technology company authorized as a Common Vulnerability and Exposures (CVE®) Numbering Authority by the CVE Program, further demonstrating the company's leadership in health care cybersecurity. As a CVE Numbering Authority (CNA), BD is authorized to assign CVE identification numbers to newly discovered vulnerabilities in its software-enabled...

Read More

Data Security, Platform Security, Software Security

BLUEVOYANT RECOGNIZED WITH MICROSOFT VERIFIED MANAGED XDR SOLUTION STATUS

BlueVoyant | October 21, 2022

news image

BlueVoyant, an industry-leading cyber defense company that combines internal and external cybersecurity, today announced it has achieved Microsoft verified Managed Extended Detection and Response (MXDR) solution status. By achieving this status, BlueVoyant has proven its robust MXDR services, which include a Security Operations Center (SOC) with 24x7 year-round proactive hunting, monitoring, and response capabilities, are all built on tight integrations with the Microsoft Security platform. This...

Read More

Cloud Security

GOOGLE CLOUD NEXT 2023 EMBRACES GENERATIVE AI FOR SAFER DIGITAL FUTURE

Google | September 18, 2023

news image

Google reveals its pioneering approach to applying generative AI in cybersecurity at the Google Cloud Next conference in San Francisco. Alphabet and Google CEO Sundar Pichai's keynote emphasizes Google's AI-first approach and the transformative impact of AI across industries. Google introduces innovative secu...

Read More

IT SECURITY LEADERS ENGAGE IN RISKY SECURITY, PASSWORD HABITS

Helathitsecurity | February 25, 2020

news image

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of usable security tools, according to a recent report from Yubico and conducted by the Ponemon Institute. Researchers surveyed 2,507 global IT and IT security leaders, as well as 563 individual users. They found that while most IT leaders have strong awareness of best practice authentication and password ...

Read More
news image

Data Security

BD TO ADVANCE LEADERSHIP IN CYBERSECURITY TRANSPARENCY AND PREPAREDNESS

BD | June 07, 2021

A leading global medical technology company, BD (Becton, Dickinson and Company), today announced that it has become the first medical technology company authorized as a Common Vulnerability and Exposures (CVE®) Numbering Authority by the CVE Program, further demonstrating the company's leadership in health care cybersecurity. As a CVE Numbering Authority (CNA), BD is authorized to assign CVE identification numbers to newly discovered vulnerabilities in its software-enabled...

Read More
news image

Data Security, Platform Security, Software Security

BLUEVOYANT RECOGNIZED WITH MICROSOFT VERIFIED MANAGED XDR SOLUTION STATUS

BlueVoyant | October 21, 2022

BlueVoyant, an industry-leading cyber defense company that combines internal and external cybersecurity, today announced it has achieved Microsoft verified Managed Extended Detection and Response (MXDR) solution status. By achieving this status, BlueVoyant has proven its robust MXDR services, which include a Security Operations Center (SOC) with 24x7 year-round proactive hunting, monitoring, and response capabilities, are all built on tight integrations with the Microsoft Security platform. This...

Read More
news image

Cloud Security

GOOGLE CLOUD NEXT 2023 EMBRACES GENERATIVE AI FOR SAFER DIGITAL FUTURE

Google | September 18, 2023

Google reveals its pioneering approach to applying generative AI in cybersecurity at the Google Cloud Next conference in San Francisco. Alphabet and Google CEO Sundar Pichai's keynote emphasizes Google's AI-first approach and the transformative impact of AI across industries. Google introduces innovative secu...

Read More
news image

IT SECURITY LEADERS ENGAGE IN RISKY SECURITY, PASSWORD HABITS

Helathitsecurity | February 25, 2020

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of usable security tools, according to a recent report from Yubico and conducted by the Ponemon Institute. Researchers surveyed 2,507 global IT and IT security leaders, as well as 563 individual users. They found that while most IT leaders have strong awareness of best practice authentication and password ...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us