Archive | Cloud RSS feed for this section

2017 is the Year Of the Phishing Attack

Kivu’s Douglas Brush sits down with David Navetta, breach coach From Norton Rose Fulbright, to speak about incident response for the Cyber Security Interviews Podcast. Douglas Brush, Director from Kivu’s Denver, CO office is the founder and host of the Cyber Security Interviews podcast. He recently published an episode with David Navetta, US co-chair of Norton […]

Using Microsoft Outlook to Retrieve Gmail Messages for Forensic Investigation

One of the most popular email programs used today is Gmail.  Kivu initiated a project to determine the most efficient and defensible process to collect Gmail account information. This blog post is the second in a series of articles that evaluate Gmail collection options for computer forensic purposes. A common email client that can be […]

Forensically Preserving Facebook Content – Challenges and Guidelines

Social media has become a notable source of potential forensic evidence, with social media giant Facebook being a primary source of interest. With over 1.35 billion monthly active users as of September 30, 2014 [1], Facebook is considered the largest social networking platform. Kivu is finding that forensic collection of Facebook (and other sources of […]

Using Web Pages in Forensics Investigations

Internet technology provides a substantial challenge to the collection and preservation of data, metadata (data that describes and gives information about other data) in particular. This blog post from Kivu will explain the factors to consider in using web pages in forensics investigations. The challenge stems from the complexity of source-to-endpoint content distribution. Originating content […]

Using Gmvault to Retrieve and Store Gmail Messages for Forensic Investigation

The cloud is becoming an ever-increasing repository for email storage. One of the more popular email programs is Gmail, with its 15 GB of free storage and easy access anywhere for users with an Internet connection. Due to the great number of email accounts, the potential for large amounts of data, and no direct income, […]

Gambling with InfoSec in the Cloud

The enduring onslaught of data breach events such as the theft of 4.5 million health records from Community Health Systems or the recent staggering loss of information for 76m JP Morgan accounts continues to highlight the need for robust information security and the ability to proactively prevent and redress potential security incidents. In response, organizations […]

What Is the Wayback Machine And How Does It Work?

The Wayback Machine is a digital archive of Internet content, consisting of snapshots of web pages across time. The frequency of web page snapshots is variable, so all web site updates are not recorded.There are sometimes intervals of several weeks or years between snapshots. Web page snapshots usually become available and searchable on the Internet […]