Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Cybersecurity 101
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Network Forensics

  1. Home
  2. Network Forensics

Category: Network Forensics

Case Studies Compromise Detection DFIR Incident Response Network Forensics

Security Analytics Using ELK

Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]

17 May, 2025
Fundamentals Hacks Network Forensics

Concurrent RDP connections hack – XP

by Toufiq Ali, NII Consulting Before you read further make sure you back up all the original settings of the […]

17 May, 2025
9
Network Forensics

Infosec Scenario in 2009

1. Business continuity to get focus over disaster recovery BCM is a process issue related to building the framework to […]

17 May, 2025
1
Network Forensics

Reasons for Failure of Business Continuity Plans

I was recently attending a conference on Business Continuity Management, and happened to attend an enlightening talk given by Mr. […]

17 May, 2025
Network Forensics

Forensics Awareness week at Mumbai

The Directorate of Forensic Science laboratory, Government of Maharashtra Mumbai is holding a forensics awareness week from 7th to 11th […]

17 May, 2025
1
Network Forensics

CHFI Workshop

From NII Consulting NII Consulting is glad to announce its fourth hands-on workshop for EC-Council’s “Certified Hacking Forensic Investigator (CHFI)” […]

17 May, 2025
2
Network Forensics

Importance of “thumbs.db” in digital forensic world

by Kush Wadhwa, NII Consulting Are you working as a cyber crime investigator and looking for something which can prove […]

17 May, 2025
8
Network Forensics

Volume Boot Sector Format of FAT

by Kush Wadhwa, NII Consulting There are times when you don’t have sufficient tools to understand the file system. At […]

17 May, 2025
9
Network Forensics

Recycle Bin Forensics

by Kush Wadhwa, NII Consulting Have you ever thought of what happens when you hit the delete button? Delete: When […]

17 May, 2025
6
Network Forensics

Changes proposed to Indian IT Act

By, K K Mookhey At long last there is news that changes will definitely be made to the Indian IT […]

17 May, 2025
4
  • 1
  • 2

Sidebar

Recent Posts

  • Robust Cyber Security Solutions to Prevent AttacksJune 19, 2025
  • Impact of AI on Cybersecurity JobsJune 18, 2025
  • Comprehensive Data Security Solutions for EnterprisesJune 18, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

AI-Driven Defense Cloud Computing Cloud Infrastructure Cloud Security cybersecurity Cyber Security hacking Penetration Testing

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.  visualize, implement, sustain, and evolve your organization’s security posture.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top