Image via Wikipedia
Forensic Software Tools This post   summarizes the features and advantages of a large number of software   forensics tools. For detailed information and technical reports it is always   best to view the vendor Web sites as well as organizations that conduct   technical reviews and evaluations such as National Institute of Standards and   Technology (NIST). The Computer Forensic Tools Testing project (CFTT) web site contains additional valuable information: 
 The information presented in this   chapter is heavily based on the assertions of the various vendors who make   the products listed in the chapter. Much of the information has been taken   from the vendors product sheets. The Computer Forensic Tools Testing project   is a good source of comparative data when deciding between these vendors. Some of the tools I plan to discuss in my future posts are: 
 Stay tuned to know more about   these 🙂  | 
View article…
Related articles
- NIST Releases Federal Cloud Roadmap, Architecture (informationweek.com)
 - 4 new reports update Security Content Automation Protocol (eurekalert.org)
 - 2 new publications provide a cloud computing standards roadmap and reference architecture (eurekalert.org)
 - NIST Releases Federal Risk Assessment Guide (informationweek.com)
 - FISMA Draft Guide for Conducting Risk Assessments Released (infosecurity.us)
 - NIST’s NICE (infosecurity.us)
 - NIST’s Guide for Conducting Risk Assessments (superconductor.voltage.com)
 - NIST Needs NICE Notes (novainfosecportal.com)
 - NIST Publishes Cloud Computing Roadmap (infosecurity.us)
 - NIST tests help ensure reliable wireless alarm beacons for first responders (physorg.com)
 - Symantec, VMware Pledge Secure Desktop-As-A-Service Offering (portadiferro2.blogspot.com)
 - IT Security & Network Security News & Reviews: Google’s Expanded Privacy Tools … (portadiferro2.blogspot.com)
 - Hacker to Demonstrate ‘Weak’ Mobile Internet Security (portadiferro2.blogspot.com)
 - Report: Chinese military developing cyberwarfare tools (portadiferro2.blogspot.com)
 - IT Security Pros Worry About APTs, but Can’t Change User Behavior (portadiferro2.blogspot.com)
 - HP expands enterprise security portfolio with digital vaccine toolkit (portadiferro2.blogspot.com)
 - SpyEye Hacking Tool Now Accessible To The Criminal Masses (portadiferro2.blogspot.com)
 - Advanced Malware, Targeted Attacks Compromise Enterprises via … (portadiferro2.blogspot.com)
 - Degree of foresight as police forces learn to tackle cybercrime (portadiferro2.blogspot.com)
 - Don’t Blame the Domain: Where Internet Bad Boys Aren’t Hiding (portadiferro2.blogspot.com)
 
