News

Jobs

Defining Cloud Forensics for a Rainy Day

Cloud computing technology is rapidly changing the way we use Information Technology. It offers a virtualised alternative to the traditional physical infrastructure that has been used for years. These virtual environments are often managed by a third party and are becoming increasingly popular within businesses. Cloud offers the ability to minimise the use of hard […]

Read More...

The University of Kent Selected for UK’s New Cyber Threat Research Institute

The 1st of April 2013 saw the opening of new Research Institute for cyber threats; the University of Kent having been specially selected as the academic research arm of the project. A grant of £4.5 million pounds will allow the University’s School of Computing to review and design automatic analysing programmes to tighten up on […]

Read More...

Competency Based Interview Questions

Competency based questions are becoming more widely used as a way of screening and interviewing candidates. They aim of them is to assess skills and abilities rather than focusing solely on the experience on a candidates CV and producing empty answers. A candidate that aces a competency based interview will show that they have capabilities […]

Read More...

Bank In Trouble Again For AML Breaches

The world’s local bank is in trouble again. The latest anti money laundering crisis that links HSBC to proceeds of crime this time involves Argentina. Fresh accusations have arisen since the $1.9bn settlement between HSBC and the US authorities back in December. The Argentine led charges currently before the federal court system relate to a […]

Read More...

Obtaining Computer Forensic Evidence: Companies Using Unqualified Professionals

As with all forensic evidence, the methods used to investigate, store and present information is essential to any legal proceedings of which it may be subject. Computer forensics is no exception. Since many organisations in modern day have the vast majority of their data stored electronically, an understanding of best practice for interrogation procedures is […]

Read More...
Navigation
Menu
Simple Share Buttons