Security is FUN by KienEng Chan
Information security stories. The fun ones.
Tuesday, August 20, 2013
Enterprise IT Forensic Process - Reporting
›
So far, I have covered 3 of the 5 key processes of Enterprise IT Forensic Process: 1) Approval - Ensuring that we are allowed to do wh...
Tuesday, July 23, 2013
Enterprise IT Forensic Process - Analysis
›
In the last two months, I have talked about the first two processes - Approval and Acquisition . Now, let's us move to the next proc...
Saturday, June 8, 2013
Enterprise IT Forensic Process - Acquisition
›
Last month, I talked about the first process in Enterprise IT Forensic Process , which is the Approval process. Today, I shall proceed t...
Sunday, May 12, 2013
Enterprise IT Forensic Process - Approval
›
In last March 2012, I wrote a piece about what are the key processes for IT Forensic in Enterprise 's environment. Let's do a bit...
Tuesday, April 9, 2013
Hack in the Box Amsterdam 2013
›
Today marks the end of the first part - Tech Training. Yesterday was a pretty smooth but today was a different story. The "TECH TR...
Saturday, March 9, 2013
5 Key Processes in Enterprise IT Forensic
›
As an Information Security Professional, I'm sure that many of us had been approached by the management to perform IT/digital forensic ....
Monday, February 4, 2013
Why it is crucial to perform IT or computer forensic in a forensically sound manner?
›
One does not need to be a CSI fan to know that before a search can be performed, a warrant is required for the law enforcement to enter a...
Tuesday, January 8, 2013
Yahoo Mail is now fully HTTPS. This is how to turn it on.
›
Good news to loyal Yahoo Mail users like me, as of 2013 you can have full HTTPS session when using Yahoo Mail. Some would argue that...
‹
›
Home
View web version