Blog by Amber Schroader & Guests

Forensic-Impact

Understanding the Risks of AI in Investigations
Understanding the Risks of AI in Investigations

When data integrity is everything, hooking an AI tool directly into your investigation workflow is a major security gamble especially when dealing with sensitive evidence, login credentials, or PII. As AI becomes a standard feature in forensic tools and other digital...

read more
Why do tools show different results?
Why do tools show different results?

Since I started working in the DFIR space many years ago I always remembered the rule of two tools. That rule, although stated, is not always followed by every examiner. With the rising costs of DFIR tools many organizations have only funded one tool for their teams,...

read more
Inside Malicious Office Documents
Inside Malicious Office Documents

Guest Blogger: Luca Garofalo Today whether it is at work, in school or any other context we receive documents. They are very usefull they allow us to keep informations in a more organized way thanks to tables, images and text formatting. However some documents can...

read more
If Digital Evidence Could Lie: How Machines Create False Truths
If Digital Evidence Could Lie: How Machines Create False Truths

Guest Blogger: Shatakshi Khadke “In the courtroom, machine-generated timelines often speak louder than human doubt.”  Digital evidence is presented into court with an invisible badge of authority. A timeline is extracted by a tool, a log generated by a system, or a...

read more
AI Doesn’t Need a Trust Score
AI Doesn’t Need a Trust Score

Guest Blogger: Stephen Coston The views expressed are my own and do not represent those of my employer or any affiliated organization.Courts Don’t Regulate Tools. They Regulate Testimony. Every few months, the same question resurfaces in legal and forensic circles:...

read more
Oculus Data Artifacts
Oculus Data Artifacts

In the rapidly evolving landscape of digital forensics, the objects of our investigations often move faster than our tools. While the industry is currently focused on the latest "Mixed Reality" headsets, a significant volume of digital evidence still resides on legacy...

read more
Mastering the Essential Skills of a Digital Investigator
Mastering the Essential Skills of a Digital Investigator

In our increasingly interconnected world, the need for skilled digital investigators has never been greater. From cybercrime to corporate espionage, these digital detectives play a crucial role in uncovering truth and ensuring justice. But what exactly makes a good...

read more
Preserving the Past through Digital Forensics
Preserving the Past through Digital Forensics

Data can be created, altered, or destroyed in the blink of an eye. This fact gives rise to the single most important principle in digital forensics, a principle so fundamental it is the first thing you are taught when entering the field. Preserve the Data The moment...

read more
Why OSINT + DFIR is the Ultimate Power Couple
Why OSINT + DFIR is the Ultimate Power Couple

We are living in a hyper-connected, threat-saturated digital landscape, incident responders and forensic investigators can no longer afford to work in silos where there is no information sharing. As we see more of our individual industries come together to get part of...

read more
How Digital Forensics Fits into Cybersecurity
How Digital Forensics Fits into Cybersecurity

Digital forensics is an essential pillar of modern cybersecurity. As cyber threats grow in complexity and frequency, organizations rely on digital forensics to investigate, respond to, and learn from security incidents. This specialized field not only uncovers the...

read more
iOS Hidden & Locked Apps
iOS Hidden & Locked Apps

iOS updates are always a whirlwind of new features, and iOS 18 is no exception. While the headline-grabbing changes often focus on revamped interfaces and flashy tools, there's a quieter revolution happening beneath the surface: the ability to manage and even hide...

read more
OSINT Tool Perspective
OSINT Tool Perspective

Guest Blogger: Nathan BlockOSINT, or Open-Source Intelligence, is a methodological process involving the systematic collection, evaluation, and analysis of publicly accessible information from diverse sources to produce actionable intelligence. Its primary purpose is...

read more
Windows Log Analysis: From Raw Data to Forensic Insights
Windows Log Analysis: From Raw Data to Forensic Insights

Guest Blogger: Vamsi Krishna Chinta  Understanding raw log locations in Windows and efficiently extracting and structuring them is crucial for forensic investigations and incident response. Eric Zimmerman's tools provide a powerful way to process these logs, making...

read more
Essential Tools Every Small Consulting Business Needs to Grow
Essential Tools Every Small Consulting Business Needs to Grow

Guest Blogger: Lance Cody-Valdez       Editor: Amber SchroaderIn the fast-moving world of small business, digital tools are no longer a luxury—they’re a survival kit. This is even more important when you rely on technology for your small business to make money. But...

read more
How Data Analytics Is Changing the Way Businesses Operate
How Data Analytics Is Changing the Way Businesses Operate

Guest Blogger: Lance Cody-ValdezData analytics plays a key role in shaping effective strategies within business operations. If you are operating your own business for digital forensic or cyber consulting, the integration of data-focused approaches allows you to...

read more
What is threat hunting?
What is threat hunting?

Guest Blogger: Nizar B.Threat hunting is a proactive approach to cybersecurity where security researchers actively search for signs of malicious activity within an organization's network and systems. Unlike traditional security measures that rely on reactive alerts,...

read more
2024 Digital Forensic Review
2024 Digital Forensic Review

As I look back at 2024, there were a lot of shifts in the digital forensic space and the overall digital information arena. It is always hard to stay on top of things that change as often as these areas do, so I really appreciate all the valuable contributions from...

read more
Cryptocurrency and the Dark Web: A Guide to Investigation
Cryptocurrency and the Dark Web: A Guide to Investigation

Guest Blogger: Silvia GonzalezThe emergence of cryptocurrency has revolutionized the financial landscape, introducing new investment opportunities and challenges. While digital assets like Bitcoin and Ethereum offer a decentralized and secure means of transaction,...

read more
Digital Privacy: A Computer Crimes Investigator Perspective
Digital Privacy: A Computer Crimes Investigator Perspective

Guest Blogger: Jacob SipeIn my years of service with the military, I had the unique opportunity to dive into computer forensics and digital privacy. As a computer forensics analyst and Computer Crime Investigator, I developed my skills in understanding and dissecting...

read more
Become a Digital Forensics Entrepreneur: A Quick Guide
Become a Digital Forensics Entrepreneur: A Quick Guide

Building a business is like raising a child. You invest time, energy, and love into its growth. After 25 years with Paraben, I'm filled with pride and gratitude to see how far it has come. It's a testament to the hard work and dedication of our team, and I'm thrilled...

read more
Critical Infrastructure and IoT Survivability
Critical Infrastructure and IoT Survivability

Guest Blogger: Luther "Chip" (Chip) HarrisThis content represents a particular viewpoint and may not reflect the views of all individualsHere is what is going to affect the current landscape that we deal with in the Integrating the Internet of Things (IoT) into...

read more
Memory Forensics Tools Overview
Memory Forensics Tools Overview

Guest Blogger: Kokab RasoolMemory forensics is becoming more essential in incident response and threat analysis as new threats and sophistication arise in the changing cybersecurity landscape. Memory forensics, as opposed to traditional approaches that rely on hard...

read more
TikTok Compliance Data Your New BFF
TikTok Compliance Data Your New BFF

Haven't heard of TikTok? Then you might have been living under a rock (or maybe just enjoying some serious digital detox!). TikTok is one of the world's most popular social media platforms, where users share short-form, often viral videos, featuring dance challenges,...

read more
OSINT Tools And Techniques for Digital Forensics Nerds
OSINT Tools And Techniques for Digital Forensics Nerds

Written by: Stephanie HonoreIntroduction    As a professional software engineer with a passion for digital forensics, I often find myself drawn to unraveling the complexities of cyber threats in my spare time. With a background in building eDiscovery software and some...

read more
Phishing Attacks via Social Media
Phishing Attacks via Social Media

When it comes to cybersecurity, it's common to underestimate the risk of cyber threats infiltrating your home. Yet, the reality is that with children who may not be fully aware of cyber safety measures, it's easy for threats to creep in. Recently, one of my children...

read more
Making an Investigations Sock Puppet
Making an Investigations Sock Puppet

Transcript Hello and welcome to the next edition of, the Forensic Impact blog. I'm Amber Schroader. I have been off the video blog for a hot minute because I have broken my ankle, as you can see by my scooter. This is the best background I can get going right now. So,...

read more
Strengthening Your Career In Digital Investigations
Strengthening Your Career In Digital Investigations

Transcript Hi there, and welcome to another installment of forensic impact. I'm Amber Schroader, and this week I am sharing with you information about strengthening your career in digital investigations. This was a topic conversation that I had with one of the blog...

read more