Summary
This issue of Cyber Secrets covers several items within the Incident Response real including tools and techniques to make an incident responder’s job a little easier. Included is a sample preservation letter if you need to request evidence from a third party , memory capture, log analysis, and more.