Special Publication 800-101 Revision 1 is aimed to help organizations develop procedures to deal with the explosion of mobile devices and to prepare specialists to conduct forensically sound examinations.
An organization's security is only as strong as that of its partners, says Mandiant Director Charles Carmakal, who offers insight on common attack trends emerging from recent data breach investigations.
Understanding big data is not the problem, say Michael Fowkes and Aaron Caldiero of Zions Bank. Figuring out how to use the information contained within big data in a meaningful way - that's the trick.
To mitigate the top threats for 2013, organizations need to understand the motivations of potential attackers so they can adequately defend their networks and systems. Experts describe risk management strategies for the year ahead.
Forensics expert Rob Lee says its not new types of attacks that concern him. It's the old ones that continue to impact organizations. How can forensics pros learn from past incidents and respond in 2013?
Before embarking on the tragic Newtown, Conn. shootings, Adam Lanza reportedly destroyed his computer. But is the machine's data also destroyed? Forensics expert Rob Lee discusses how "lost" data is retrieved.
For years, David Matthews, Deputy CISO of the City of Seattle, has been immersed in securing electronically stored information. Now he's written the book on the topic. What are the key themes addressed?