Blog - SearchInform

Blog

Cybersecurity Investigations

29.09.2022

What is required to conduct a cybersecurity investigation


Investigation Insider Risk assessment

(In) Secure digest: the hit parade of the most comical infosecurity incidents

07.04.2021

The most comical infosecurity incidents to laugh and learn from it. Enjoy, but tread carefully!


Investigation Fraud Human factor

User activity audit, investigation

06.08.2020

There are so many contextual factors to sift through that actually finding the newest threat and eliminating it is an encumbering job.


Investigation Internal audit Risk assessment

Life changing risks pentesters take to help you boost security (cont.)

28.07.2020

The very courthouse that they broke into last night and now they’re sitting in the courthouse waiting to see the judge.


Investigation Risk assessment Third party

Social engineering attacks

28.04.2020

With how connected the Internet is today, a lot of information that we couldn’t afford to share is potentially within the grasp of the most inventive malicious predators online.


Investigation Personal data Risk management

HR investigations

04.08.2019

Although the primary function of a human resources department is to recruit and train personnel, there are many situations in the workplace that HR has to deal with, including ethics breaches and company policy violations.


Investigation Employee monitoring Human factor

Computer forensics

18.07.2019

When you discover that your enterprise has been victimized by cybercrime or breached, your first thought is to seek out the origin of the crime.


Investigation Human factor

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.