Download our free guide to find hidden attackers.

Find hidden attackers with Open NDR

SEE HOW

volt-typhoon-warning

Detect advanced attacks with Corelight

SEE HOW

cloud-network

Corelight announces cloud enrichment for AWS, GCP, and Azure

READ MORE

partner-icon-green

Corelight's partner program

BECOME A PARTNER

glossary-icon

10 Considerations for Implementing an XDR Strategy

READ NOW

ad-images-nav_0006_Blog

Don't trust. Verify with evidence

video

The Power of Open-Source Tools for Network Detection and Response

ad-nav-ESG

The Evolving Role of NDR

ad-images-nav_0006_Blog

Detecting 5 Current APTs without heavy lifting

g2-medal-best-support-spring-2024

Network Detection and Response

 

NETWORK FORENSICS: KEY STEPS FOR DATA COLLECTION AND PRESERVATION


By Richard Bejtlich

The cybersecurity discipline of network forensics involves the collection and analysis of network data to support legal and security actions. Understand the essentials of the network forensics process, the challenges in network forensics, tools to use, and the steps to take during data preservation and collection that can help you improve data integrity.