Unlike IP fragmentation (which can be done by intermediate devices), IP reassembly can be done only at the final destination.…
The newly increased focus on cyber security will provide opportunities to make a positive impact, but security professionals should take…
The most damaging corporate computer crime today is hacking large companies that manage our nation’s critical infrastructure, such as electricity…
The most important cyber crime law available to law enforcement is the Computer Fraud and Abuse Act of 1986, commonly…
The American Bar Association requires all prosecutors to make a clear and complete record for review during trial. As with…
I believe the preparation phase of a digital search is the most important because it determines whether evidence will meet…
Digital forensics are. Here are some ways that data can be hidden within storage media : Example 1: Deleted Files…
Back in October, we were asked to analyze significant events that impacted critical infrastructure in 2016. I reviewed publicly available…
My most recent Tripwire State of Security Blog post is about communication skills for academic excellence and how it translates…
One of my first graduate research papers was about cyber attacks against critical infrastructure. After that, I became passionate about…