Quantcast
Channel: CSO Online Investigation and Forensics
Browsing latest articles
Browse All 173 View Live

How to optimize Windows event logging to better investigate attacks

After a compromise, the first thing investigators will do is review the log files. The default logging on Windows machines, however, does not capture enough information to identify forensic artifacts....

View Article



5 best practices for designing application logs

Veronica Schmitt started to wear an implantable cardiac device when she was 19. A few years ago, although the small defibrillator appeared to be working properly, she felt sick. "I kept passing out,...

View Article

How Windows admins can get started with computer forensics

The recent cybersecurity symposium that aimed to “prove” the 2020 US election was a fraud made headlines not because of evidence found, but rather the absence of evidence. As I watched the three-day...

View Article

Ransomware, endpoint risks are top concerns for DFIR professionals

The rise of ransomware attacks that occurred after the global pandemic in March 2020 remains a problem. However, ransomware is not the only threat. According to a new report from IDC and Magnet...

View Article
Browsing latest articles
Browse All 173 View Live




Latest Images