Digital Forensics
The tools we’ve talked about up until now were designed to analyze, identify, capture, and store digital traffic to aid cybersecurity defense teams in further analyzing and responding. Some of the tools themselves had potential abilities built into their design to respond automatically on behalf of we silly naïve humans.
However, no matter how technologically advanced and no matter how well trained we cyber defenders are, there is always going to be someone out there with our level of skillset or greater who is able to find deeply complex and advanced ways to circumvent our methods. These are some of the more damaging cybercriminals in the world; these are the folks who might be trained by big-budget organizations such as nation states or organized crime units. They are experts at playing the long game and taking the time and money – years upon years if need be – to train highly dedicated personnel who might share their employer’...