Yesterday I held a presentation on forensics and incident response at the TrueSec Security Summit. One of the major challenges when responding to a breach is figuring out exactly what an attacker has done on a machine. Did they dump…
Yesterday I held a presentation on forensics and incident response at the TrueSec Security Summit. One of the major challenges when responding to a breach is figuring out exactly what an attacker has done on a machine. Did they dump…