Basis Technology Blog
You are currently viewing all posts tagged with Cybersecurity.
Announcing Cyber Triage 1.1: Triage hosts wherever they may be
Improving your endpoint situational awareness doesn’t have to involve the heavy infrastructure requirements that often go hand-in-hand with continuous monitoring. With its 1.1 release, Cyber Triage — incident response software that enables first responders to quickly determine if a host is compromised — makes it easier for you to automate incident response whether suspicious hosts […]Read more
Is Cybersecurity Legislation for the Private Sector on the Horizon?
Pick your favorite high-profile cyber event of 2013/2014: Edward Snowden, the infamous Chinese hackers, Target, Twitter, the Federal Reserve. Any one of these events would be worthy of some serious attention, and the U.S. Federal Government is certainly giving it. For years, the US Federal Government has been talking about ways of improving information security […]Read more
Data Breaches Detected, What Now?
The cybersecurity industry is massive. Billions of dollars are spent worldwide on intrusion detection and prevention systems, firewalls, anti-virus software, and a host of other pieces of infrastructure meant to keep intruders out. But, even with all this money, advanced technology, and great marketing buzz, huge data breaches are reported nearly every day across a […]Read more
Autopsy Feature: Graphical Timeline Analysis for Cyber Forensics
Overview Timelines are useful in digital forensics for identifying when activity occurred on a computer and are mainly used for data reduction or identifying specific state changes that have occurred on a computer. Amazingly, this broad usage helps answer a lot of questions different investigators can have. That’s why we recently added a timeline feature […]Read more
Basis Mobile Forensics Technical Lead to Speak at Cyber Defense Initiative 2012 in Washington DC
How often do you work with mobile devices? Knock-off handsets are prevalent in Asia, Europe and are infiltrating the borders of the United States. Commercial forensic tools do not provide the same amount of support for knock-off devices as they do for GSM and CDMA handsets. Specialized forensic tools and add-on options to commercial kits […]Read more