New Search

If you are not happy with the results below please do another search

89 search results for: corporate

11

Arson or Fire Loss Investigation

[ What is Arson? ] [ Types of Arson ] [ Arson Motivation ] [ Arson Targets ] [ Arson Investigation ] What is Arson? A crime like arson is done for profit or financial gain. With this in mind, it is a criminal method of stealing money from the fire insurance company. Hence we will do […]

13

Insider Threat Investigations

[ Reality of Insider Threat ] [ Types ] [ Threat Actors ] [ Dangers ] [ Red Flags ] [ Counter Measures ] The Insider Threat is real The “insider threat” will sneak around in your offices like a snake, poke around in your network, look for confidential information, and check what is on […]

14

SOCMINT – Social Media Intelligence Gathering

[ What is SOCMINT? ] [ Social Media Monitoring ] [ Information Extraction ] [ Social Media Investigation ][ Psychological Analysis ] [ ProcessReport ] What is SOCMINT? Social Media Intelligence (SOCMINT) consists of a set of search methods and technologies. These forensic techniques aim to monitor social media networking platforms and users. Many people […]

15

Cyber Espionage Investigations

[ Cyber Espionage ] [ Cyber Espionage Targets ] [ Espionage Methodology ] [ Spy-Operators ] [ Red Flags for Espionage ] [ Cyber Espionage Indicators ] [ Cyber Espionage Counter Measures ] [ Risks of Cyber Espionage ] [ Cyber Espionage Asssesment ] What is Cyber Espionage? Cyber Espionage is one of the biggest […]

16

APT Groups – Advanced Persistent Threats

What are APT groups? APT – Advanced Persistent Threat groups are essentially covert or hidden hacker organizations that perform, “attacks on a country’s information assets, critical infrastructure or other elements of national security or strategic economic importance. Standard methods used to come down to cyber espionage, cyber warfare or cyber sabotage.” These groups are elusive, […]

17

IT Security Audit

Why do you need an IT Security Audit? To know if your IT infrastructure is secure, you need to perform a professional IT security audit. Which IT security controls do you have in place? Do you have a clear view and understanding of the security of your network Which computer systems are in use? What […]

18

Counter Intelligence

Counter-intelligence is synonymous with counter-espionage. Counterintelligence will try to protect an agency its intelligence program from an adversary intelligence service. Counter Intell activities consist of: gathering information on adversaries conducting activities to prevent espionage prevent acts of sabotage prevent assassinations prevent intelligence activities conducted by foreign powers, organizations, or private entities Collective counterintelligence will gain intelligence into […]

19

Measurement and signatures intelligence (MASINT)

[Purpose] [ Types of MASINT ] MASINT is scientific and technical intelligence derived from analyzing data gathered from sensors or sensing devices. The purpose of MASINT is: MASINT focuses on identifying any distinctive features and characteristics of an emitting source or sending source. Measurement and signature intelligence (MASINT) is the technical branch of intelligence gathering, which focuses on […]

20

Identity Theft Investigation – PID

What is identity theft? Identity theft can be defined as a crime of obtaining the personal or financial information of another person by useing their identity to commit fraud. There are many types of identity theft. The target is mostly your your credit, your money and real life reputation. Identity thieves, privacy hackers and cyber […]