Putting a wrap on October

Hello again readers and welcome back! For us, October consisted of a lot of traveling giving presentations about the Live Response Collection at BSides Raleigh, Anne Arundel Community College, WomenEtc. (Richmond, Virginia), and the Open Source Digital… Continue reading Putting a wrap on October

Putting a wrap on October

Hello again readers and welcome back! For us, October consisted of a lot of traveling giving presentations about the Live Response Collection at BSides Raleigh, Anne Arundel Community College, WomenEtc. (Richmond, Virginia), and the Open Source Digital… Continue reading Putting a wrap on October

Collaborate on Cases with Autopsy 4.0

At the Open Source Digital Forensics Conference last week, we announced the launch of Autopsy 4.0, the free and open source digital forensics platform that now adds major features promoting collaboration. As a result: Multiple examiners can work on the same case at the same time, and see what other examiners are doing. Examiners have […] Continue reading Collaborate on Cases with Autopsy 4.0

The Volatility team talks proactive threat hunting with memory forensics (an OSDFCon presentation)

Our final OSDFCon blog series featured speaker is actually a collective: the team behind the nonprofit Volatility Foundation. This year, memory forensics has evolved once more, and the Volatility team talked to us about using it to be more proactive than reactive in incident response. BT: Your talk topic this year is “Feasting Off the […] Continue reading The Volatility team talks proactive threat hunting with memory forensics (an OSDFCon presentation)

The advantages of cloud computing for forensic analysis (an OSDFCon presentation)

Google team members are back on our blog this week for another installment of our blog series on the speakers and topics we’re offering at OSDFCon this coming October. This time, Cory Altheide and Johan Berggren, who are responsible for cloud forensics preparedness and response at Google, talked with us about the Turbinia tool they’ll be presenting Oct. 28th.

Continue reading The advantages of cloud computing for forensic analysis (an OSDFCon presentation)

A case study in new generation timeline tools (an OSDFCon presentation)

This week’s featured speaker in our OSDFCon blog series is Daniel White, a security engineer at Google. Daniel is offering both a lecture at OSDFCon and a half-day workshop the day before the conference, and he shared more with us about his topic and the importance of timeline data: BT: Your talk topic this year […] Continue reading A case study in new generation timeline tools (an OSDFCon presentation)

Introducing SQUID: Don’t miss evidence because the app updated! (an OSDFCon presentation)

This week we continue our blog series covering the speakers and topics we’re offering at OSDFCon in Herndon this coming October. Ryan Benson, a digital forensic examiner at Stroz Friedberg’s San Francisco office, took the time to talk with us a little bit about his open source utility SQLite Unknown Identifier (or SQUID), which he’ll […] Continue reading Introducing SQUID: Don’t miss evidence because the app updated! (an OSDFCon presentation)

A plugin that overcomes the limits of traditional blacklist file-hash comparisons (an OSDFCon presentation)

This week we continue our blog series covering the speakers and topics we’re offering at OSDFCon in Herndon this coming October. Michael McCarrin and Bruce Allen, Research Associates at the Naval Postgraduate School, took the time to talk with us a little bit about their presentation of their new Autopsy plugin: BT: Your talk topic […] Continue reading A plugin that overcomes the limits of traditional blacklist file-hash comparisons (an OSDFCon presentation)

Inferring Past Activity from Partial Digital Artifacts (an OSDFCon presentation)

This week we continue our blog series covering the speakers and topics we’re offering at OSDFCon in Herndon this coming October. Jim Jones, Associate Professor of Computer Forensics and Cybersecurity Engineering at George Mason University and a 20-year cyber security veteran, talks about digital artifacts as the pieces of a puzzle depicting the what, where, when, and how of an incident: Continue reading Inferring Past Activity from Partial Digital Artifacts (an OSDFCon presentation)