Getting started in digital forensics

InfoSec Institute

Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, for this on-demand webinar as we discuss: The difference between computer, mobile and network forensics. How a forensics certification can progress your career.
Watch Now

Spotlight

heutige Angriffe gegen Microsoft 365 gehen über typisches Password Spraying und Phishing-Versuche hinaus, die wir aus den letzten Jahren kennen. Mittlerweile sind deutlich raffiniertere Akteure wie Nobelium aktiv, die anderen Angreifern demonstrieren, wie sie besser in diesen neuen Cloud-First/Mobile-First-Umgebungen agieren kön

OTHER ON-DEMAND WEBINARS

3-Minute Video: Overcoming the Challenges of an Unplanned Distributed Workforce

When the world stayed home overnight, organizations had to rapidly solve the challenges of an unplanned distributed workforce – from maintaining visibility across the IT environment and tracking corporate and BOYD devices to closing existing and new vulnerability gaps. Tanium's unique structure was built for these challenging en
Watch Now

Cyber Security in the Healthcare Industry

The healthcare industry in today’s world has experienced tremendous technological transformation. The developments have brought efficiency and significant benefits to care delivery. On the other hand, the industry faces increasing threats from cybersecurity issues.
Watch Now

IoT Security and Artificial Intelligence for better industrial applications

Watch this 45-minute free webinar, and gain insights about IoT & Industrial IoT, Edge, and AI through a detailed analysis of each stage of the IoT device lifecycle.
Watch Now

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Spotlight

heutige Angriffe gegen Microsoft 365 gehen über typisches Password Spraying und Phishing-Versuche hinaus, die wir aus den letzten Jahren kennen. Mittlerweile sind deutlich raffiniertere Akteure wie Nobelium aktiv, die anderen Angreifern demonstrieren, wie sie besser in diesen neuen Cloud-First/Mobile-First-Umgebungen agieren kön

resources