Skip to main content
  • Digital Forensics 2.0
    Digital Forensics 2.0

    Changing World, Changing Way

    As today’s cyber space continues to evolve, so must the way we conduct cyber investigations. Sources of evidence are growing rapidly. For those who fail to keep up, collecting and authenticating evidence during a cyber investigation will prove to be a difficult task. For those with a clear understanding of how to leverage advances in technology and the wealth of information available online, the evidence collected during a cyber investigation can help create a solid court case.


  • When Journalist Under Cyber Attacks
    When Journalist Under Cyber Attacks

    In the Beginning

    One chilly evening a quick-breathing voice muttered over the phone saying his laptop computer was sabotaged. As the story unfolded, a journalist John who reported in-depth news about a political figure has been warned to keep quiet. John continued his job as usual. Somehow one evening when John was too tired and slammed his laptop to the sleep mode. So was he. Early next morning when he got up, to his surprise, he found the wallpaper of his computer was replaced by a bloody chopped head’s theme.

  • Asymmetric Threats in Cybersecurity
    Asymmetric Threats in Cybersecurity

    Asymmetric Threat

    The concept of “asymmetric threat” has its root from the military [1].  The asymmetric threat is defined as an attempt to circumvent or undermine an opponent’s strengths while exploiting the weakness, using methods that differ significantly from the opponent’s usual mode of operations.   

  • Cover
    The ABC's of Cybersecurity Models

    NIST Cybersecurity Framework

    The Framework [1] focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes.

    The Framework Core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover.  When considered together, these Functions provide a high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk.

  • Cover
    The Unsteady State of Cybersecurity

    The State of Cybersecurity

    In November and December 2015, ISACA and RSA Conference conducted a global survey of 461 cybersecurity managers and practitioners [1]. Survey participants confirmed that the number of breaches targeting organizational and individual data continues to go unchecked and the sophistication of attack methodologies is evolving. The current state of global cybersecurity remains chaotic, the attacks are not expected to slow down, and almost 75 percent of respondents expect to fall prey to a cyberattack in 2016.