SA on digital forensics world stage

August 2011 News & Events, Information Security

The Digital Forensics Lab of Specialised Services Group (SSG) has taken a step onto the global stage. Incorporating expertise from experienced forensics experts in Johannesburg, Washington DC, London and Mauritius, the Lab has joined forces with Decision Intelligence International to offer local forensic services internationally.

Riana Smalberger, head of the local Digital Forensic Lab explains that digital forensics is basically the investigation of electronic data for public and private organisations. This operation requires a meticulous investigative methodology if satisfactory results are to be obtained.

The new company will operate under the Decision Intelligence International banner, headed by CEO John Brennan. While the SSG Lab has been in operation for some time, the new business will be able to attract international customers with the offer of world-class forensic services from Africa, at a lower cost.

Through its investment in cloud infrastructure, Decision Intelligence International will be able to identify, collect and preserve data, as well as analyse it in a secure manner that can be used in court. Moreover, to be able to use the results in court, the analysis must be transparent and secure, ensuring that no person is able to bias the results in favour of a client. The collection, storage and analysis of the data must also be beyond question to ensure the correct results are always obtained.

“The Lab has invested in significant infrastructure, both hardware and software to ensure we can offer forensics services on par with the best in the world,” Smallberger says. “Whether it is discovering that an employee stole the company’s customer database or tracking global fraud syndicates, Decision Intelligence International has the infrastructure and expertise to handle the job.”

The Lab, based in Johannesburg, is secured with biometric access control, bulletproof windows and fireproof doors, while CCTV surveillance is in constant operation, not to mention electronic security to protect data under analysis. Smallberger says it is geared to detect any crime in which a computer or electronic device was used.

Some of the services on offer include:

* Fraud (hard drive analysis),

* Intellectual property theft,

* Cyber stalking.

* E-mail tracing.

* Network intrusion.

* Mobile device analysis.

* CCTV analysis.

* Expert witness services.

Hi-Tech Security Solutions will delve deeper into the world of digital forensics in future issues.

For more information contact SSG Forensic Lab, +27 (0)11 518 3700, rianas@ssgsa.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.