Highlights Current Needs And Future Research Opportunities
We apply industry-accepted practices with the collection, preservation, processing, and analysis of electronic data from desktop and laptop computers, mobile devices, workstations, servers, and cloud-based sources.
We conduct advanced computer and network forensic investigations relating to various forms of malware, computer intrusion, theft of information, denial of service, data breaches, etc.
We conduct post-incident reviews to determine the root cause of information incidents, develop corrective actions, reassess risk, and evaluate response effectiveness.

