Feed on

Monthly Archive for March, 2012

The compliance market

A known and mostly accepted axiom in security is that the people doing something should not verify and accredit the same. This is to make sure that a solution is not flawed or intentionally sabotaged. This process holds true in many cases but as it turned out this is not always true for the market […]

Read Full Post »

Now and then I´m engaged to conduct computer forensics as part of a sensitive and rough investigation. Even if the primary purpose is to find evidence (or prove innocence) you will inevitable get to know the owner of the computer. I sometimes get involved in fraud investigations, CSA (child sex abuse) or intellectual property theft […]

Read Full Post »