Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Network Forensics

  1. Home
  2. Network Forensics

Category: Network Forensics

Case Studies Compromise Detection DFIR Incident Response Network Forensics

Security Analytics Using ELK

Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]

April 2, 2018January 21, 2025
0
Fundamentals Hacks Network Forensics

Concurrent RDP connections hack – XP

by Toufiq Ali, NII Consulting Before you read further make sure you back up all the original settings of the registry or set create a […]

March 26, 2009January 8, 2025
9
Network Forensics

Infosec Scenario in 2009

1. Business continuity to get focus over disaster recovery BCM is a process issue related to building the framework to increase business resiliency and restoration […]

January 1, 2009January 8, 2025
1
Network Forensics

Reasons for Failure of Business Continuity Plans

I was recently attending a conference on Business Continuity Management, and happened to attend an enlightening talk given by Mr. Vijay Sethi, CIO of Hero […]

December 31, 2008January 17, 2025
0
Network Forensics

Forensics Awareness week at Mumbai

The Directorate of Forensic Science laboratory, Government of Maharashtra Mumbai is holding a forensics awareness week from 7th to 11th Jan 2008. The Director — […]

January 9, 2008January 8, 2025
1
Network Forensics

CHFI Workshop

From NII Consulting NII Consulting is glad to announce its fourth hands-on workshop for EC-Council’s “Certified Hacking Forensic Investigator (CHFI)” certificate course. As an Accredited […]

July 30, 2007April 17, 2024
2
Network Forensics

Importance of “thumbs.db” in digital forensic world

by Kush Wadhwa, NII Consulting Are you working as a cyber crime investigator and looking for something which can prove in court of law that […]

June 22, 2007January 20, 2025
8
Network Forensics

Volume Boot Sector Format of FAT

by Kush Wadhwa, NII Consulting There are times when you don’t have sufficient tools to understand the file system. At that time your knowledge in […]

May 29, 2007January 22, 2025
9
Network Forensics

Recycle Bin Forensics

by Kush Wadhwa, NII Consulting Have you ever thought of what happens when you hit the delete button? Delete: When we simply delete a file […]

February 5, 2007January 22, 2025
6
Network Forensics

Changes proposed to Indian IT Act

By, K K Mookhey At long last there is news that changes will definitely be made to the Indian IT Act, purportedly due to the […]

October 7, 2006January 8, 2025
4
  • 1
  • 2

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top