Posted in Business, Compliance on Mar 31st, 2012
A known and mostly accepted axiom in security is that the people doing something should not verify and accredit the same. This is to make sure that a solution is not flawed or intentionally sabotaged. This process holds true in many cases but as it turned out this is not always true for the market […]
Read Full Post »
Posted in Computer Forensics on Mar 20th, 2012
Now and then I´m engaged to conduct computer forensics as part of a sensitive and rough investigation. Even if the primary purpose is to find evidence (or prove innocence) you will inevitable get to know the owner of the computer. I sometimes get involved in fraud investigations, CSA (child sex abuse) or intellectual property theft […]
Read Full Post »