It’s exciting to know the work we do is making waves across the cybersecurity and technology community. Below are a few of the mentions of our work in media articles. Explore articles by date and topic. Are you a journalist interested in interviewing a subject matter expert? Contact us to connect with a team member.

Search by

DSI Joint C2 Summit

Grier Forensics recently sponsored and presented at the 6th annual Joint C2 Summit, hosted by the Defense Strategies Institute (DSI). The event brings together all...
Read more

Congressman C.A Dutch Ruppersberger visits Grier Site

Maryland Congressman C.A Dutch Ruppersberger recently stopped by the Grier Forensics office to meet and greet with the team and learn about our programs and products....
Read more

New Approaches to Digital Evidence Acquisition and Analysis

In an effort to fight e-crime and to collect relevant digital evidence for all crimes, law enforcement agencies are incorporating the collection and analysis of...
Read more

DOJ R&D Agency Awards Grants For Speedier Digital Forensics

The US Department of Justice's R&D agency has awarded grants for the development of new tools that speed up the process of examining hard drives in the wake of a...
Read more

Grier Forensics helps law enforcement, military cyber security speed analysis of captured hard disks

Cyber security experts at the National Institute of Justice (NIJ) in Washington search for advanced search technologies to reduce the time it takes law-enforcement...
Read more

Faster data, better law enforcement

In a sign of intensifying efforts from law enforcement to harness big data, the Justice Department's research and development arm is funding software and other tools...
Read more

One Reason Security Is So Hard? Really Bad Reports.

According to Jonathan Grier, an independent security consultant, the answer to the question ‘Why aren’t we getting better at stopping attacks and protecting...
Read more

How Digital Forensics Detects Insider Theft

A new digital forensic technique promises to help solve an ongoing problem involving malicious insiders: determining whether any information has actually been s...
Read more