Knowledge Base

Need assistance but don’t want to hire a cyber security consultant?  Below are some white papers and articles that may help you resolve your case by yourself.

White Papers

White Papers

Federal Rules of Evidence and How it Applies to Cloud Forensics Examinations

When dealing with inter-jurisdictional boundaries of cloud computing, a cloud forensics examiner or law enforcement may have trouble with the lawful acquisition of digital evidence. It is ultimately important to understand how the law applies and obtain the appropriate warrants or permissions before the actual acquisition.

System Hardening and Technical Controls for Windows Computers

Are you a IT or technology professional looking for ways to reduce the attack surface and increase the security of your information assets? Below are some of the best ways to ensure your security is as good as it can be, without making too many compromises to productivity or business operations.

Fundamentals and Essentials when Creating a Business Continuity Plan

Business continuity planning or a business continuity plan is the formal process of creating a a proactive and responsive plan when handling a disruption in normal business processes. The plan incorporates before, during, and after a disruption occurs with the primary purpose to get business back to normal operations.

How Encryption Works, Encryption Types, and Known Cipher Vulnerabilities

Encryption is the act of obfuscating data to make it unreadable to unauthorized users. However, encryption is not without its' flaws. There are vulnerabilities to some encryption algorithms that may allow breaking the cipher without brute forcing the key.

Administrative Controls for Minimizing Loss in a Workplace

Are you a IT or technology professional looking for ways to reduce the attack surface and increase the security of your information assets? Below are some of the best ways to ensure your security is as good as it can be, without making too many compromises to productivity or business operations.

Methods for IT Security Staff to Investigative Malicious Emails

Business continuity planning or a business continuity plan is the formal process of creating a a proactive and responsive plan when handling a disruption in normal business processes. The plan incorporates before, during, and after a disruption occurs with the primary purpose to get business back to normal operations.