UKAS grants Extension to Scope to CCL Forensics

August 23rd, 2019

Preventing security breaches: What you need to know

July 22nd, 2019

Testimonial: Penetration testing achieves ‘first class results’

July 17th, 2019

CCL Group open sources Python modules on GitHub

July 12th, 2019

CCL Group plays crucial role in illegal immigrant case

July 12th, 2019

CCL Group achieves IASME Gold accreditation

July 12th, 2019

CCL Group achieves CHECK accreditation

June 24th, 2019

CCL Group enhances digital forensics capability with acquisition of Evidence Talks

May 30th, 2019

The top 4 reasons organisations are performing penetration tests in 2019.

May 23rd, 2019

CCL Group and Spyder Forensics Announce Strategic Partnership.

May 1st, 2019

What is Penetration Testing?

May 1st, 2019

CCL Group gain silver Investors in People accreditation.

April 24th, 2019

What is ransomware? Exemplifying incident response.

April 2nd, 2019

Write to be Understood

August 21st, 2018

What the Blazes?! – Why are there iOS Artefacts in my Windows 10 Applications?

August 2nd, 2018

Computer Storage: Form Factors, Protocols and Interfaces

July 25th, 2018

Defence Cases

June 7th, 2018

Windows 10 Timeline Forensic Artefacts

May 3rd, 2018

Mobile Device Lab – Defence Case Examination

May 1st, 2018

Digital Evidence does not exist in a vacuum

April 17th, 2018

The Smartphone Graveyard

November 1st, 2017

iOS 11: HEVC and HEIF (heic) files

October 16th, 2017

Ribbon

September 7th, 2017

Size Vs Accuracy – A Brief Explanation of Precision Recall

September 1st, 2017

Getting to the facts in Road Traffic Collisions

January 17th, 2017

Trump Email Saga

November 8th, 2016

E-disclosure for Nuisance Calls and Texts

February 20th, 2016