Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Forensics Talks is a series of interviews with Forensic Professionals from different disciplines around the globe. Learn about science, technology and important cases where Forensic Science has played an important role.
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OSINT with ShadowDragon & Digital Tools For Modern Investigations
Daniel Clemens from ShadowDragon, LLC
This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Forensic Fix is a podcast from MSAB that covers the latest news and trends in the field of Digital Forensics. The show features guests from the industry who share their insights, experiences, and advice on various topics related to Digital Forensics. The podcast covers a wide range of subjects, including mobile device forensics, welfare, industry news and more. Listeners can expect to hear about the latest tools and techniques used by Digital Forensic professionals, as well as how the field ...
…
continue reading
We take the digital forensics news of today and forecast the future long term impact to our industry, both positive and negative.
…
continue reading
Come join Lee Reiber as he discusses some digital forensic gold. Also the home for the Forensic Happy Hour with guests from the DFIR community.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading
Pro Digital Forensic Consulting is a full-service forensic data acquisition, analysis, reporting & expert witness service based in Richmond, Virginia. We service clients all over the globe in areas of litigation, professional investigation & corporate needs related to the retrieval & analysis of data. We pride ourselves on adherence to the forensic methodology & best practices. Please contact us for more information: Web: ProDigital4n6.com Email: ProDigitalConsulting@gmail.com Phone: 804-588 ...
…
continue reading
Join Nicholas Kuhne in Norway, as he delves deep into the realms of digital marketing, branding, and entrepreneurship. Explore the global perspectives of industry titans. In the ever-evolving landscape of marketing, this podcast is your reliable compass. A journey into the heart of digital marketing and branding. 🌐🎤🇳🇴
…
continue reading
How do you become a modern-day Sherlock Holmes? Leah Wietholter interviews guests and equips listeners with tools to decipher evidence to find money based on her unique experience in forensic accounting, investigations and as a Data Sleuth®.
…
continue reading
CfU is a podcast designed to bring education and information to the digital intelligence space in a new format. It is designed to deliver content to digital forensics examiners, investigators, lab supervisors, prosecutors, and anyone interested in DFIR. The podcast will include challenges mobile forensics professionals face, case studies, forensic tips and techniques, interviews with industry experts, influencers, researchers, and authors.
…
continue reading
The Appleby podcasts discuss topics and trends across the legal and financial sectors. Find out more from our multi-jurisdictional experts, in our various podcast series including 'Bermuda Shorts' and 'Asia Talks'. Appleby is one of the world’s leading international law firms. Our global teams of legal specialists advise public and private companies, financial institutions and private individuals. We are a full service law firm providing comprehensive, expert advice and services across corpo ...
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
Join us for candid conversations with remarkable women in business and entrepreneurship. We celebrate the successes of women across various fields, including digital, e-commerce, STEM, content creation, and more. Our guests share their inspiring career journeys, lessons learned , significant milestones, and the challenges they’ve faced while climbing the ladder of success. These women are true #IRLTrailblazers, and their stories will motivate and empower you. In each episode, we explore topi ...
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
Symphonic Distribution, Digital Distributor for thousands of labels worldwide presents is official podcast channel with new music mixed LIVE from the many labels distributed.
…
continue reading
THE PLUG ROOM - Plug your business. Plug your brand. "Community development is building people & linking people with people." THMLF The Plug Room has three categories we operate in. Community Development. Audio Forensics. The AU - Art Unveiled. ThePlugRoom.com | #ThePlugRoom "Digital wire-taps filled with knowledge & information directly from influencers all over the world." #1000Network | #NetworkDistribution | #Tagsofinterest Support this podcast: https://podcasters.spotify.com/pod/show/th ...
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
Join us as our host Brian Semrau (a full time digital forensics investigator and part time owner of Infosec Chicago) talks about the latest issues plaguing information security. Rather than recapping what thousands of new stories are already talking about, Brian will be discussing the issues behind incidents in the news, techniques organizations can use to stay safe, and the changes the industry needs to make in order to stay a step ahead of the threat-actors.
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
Dissection and discussion of science and science issues made digestible for public consumption. Find us on Facebook and Twitter! The intro and outro theme is Soft Illusion and was generously provided by Andras. https://andras.bandcamp.com/track/soft-illusion
…
continue reading
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
…
continue reading
The Thank God For Bitcoin Podcast is hosted by Jordan Bush and exists to explore the surprising intersections between Bitcoin and the Christian faith. Join Jordan, Head of Content and Education for TGFB Media, and thought-provoking guests as they discuss how Bitcoin is changing the world.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Hidden in Plain Sight is the podcast that de-mystifies the world of investigations, showing how a key piece of evidence can unlock even the most complex of legal cases. Presenters Lily Kennett and Juliet Young lead a team of investigators at Schillings. In this series they'll untangle cross-border investigations, art fraud, anonymous blogs and social media, metadata, imagery analysis, and more. Joined by guests from across the world of intelligence and digital forensics, Lily and Juliet expl ...
…
continue reading
worldmusicviews.com presents World Music Views Podcast. A show about monetizing the music business, but connecting technology and cultures. Covering the biggest stories in niche music genres around the world. Support this podcast: https://podcasters.spotify.com/pod/show/worldmusicviews/support
…
continue reading
The Cyber Social Hub is an online community of digital investigators. Join your host, Kevin DeLong as he discusses with a variety of guests on topics in the field of digital investigations and sometimes terrible ”dad” jokes. We talk to investigators, researchers, and vendors to get you the information you need to find the truth about digital incidents! Join us at https://cybersocialhub.com for FREE and be part of the community. If you want to see the video version of this podcast, watch us o ...
…
continue reading
Broadcasting world-class sport. Keeping hospitals running 24/7. Your boss knowing that, of course, you can join the Teams meeting from your 2-hour train journey. What do all of these things have in common? Fantastic tech, and even better people. Join us in hitting refresh on The F5 podcast, bringing you amazing stories about the human side of tech, and leaving the jargon at the door.
…
continue reading
Want to be the first to know about new technology before it becomes mainstream? Whether you’re an IT professional, CIO, an investor in tech companies, or even a computer science student, this podcast will bring you the information you need to stay relevant and be successful in the tech industry from some of the top people and companies in the world. Episodes will feature topics such as IoT, cloud evolution, augmented reality, the future of artificial intelligence, improving ROI and more.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Podcast in which students in Mr. Lange's Computer Science courses have a platform to discuss what they are currently learning in their classes, innovative development projects students are completing during their Research & Development opportunities, technology related topics that are in the news and new amazing technologies coming into the market.
…
continue reading
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
…
continue reading
Technically Legal is a legal tech podcast about legal innovation and the impact technology is having on the law. In each episode we interview an innovator in the legal industry about how technology is changing the practice of law, about the companies they are building and how legal tech is changing the way legal departments and law firms work. The podcast is hosted by Chad Main, an attorney and founder of Percipient, a tech-enabled legal services provider. Chad launched Percipient on the bel ...
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
The podcast that sails through the waters of hacking and cyber security, with Yash Gorasiya, Anugrah SR, Meera Tamboli, and Abhinav Pandey as your captains. Welcome to The HackerHarbor Podcast, your one-stop shop for all things cybersecurity! We dive deep into the world of cybersecurity, covering everything from essential topics for beginners to unique, untouched areas that impact the industry. Here's what you can expect: 🔹Career Guidance: Explore how to transition into cybersecurity or land ...
…
continue reading
Business Email Compromise (BEC) forensics involves the meticulous investigation of cyberattacks where attackers infiltrate email systems to manipulate business communications for financial gain. These attacks often entail phishing, social engineering, and credential theft to impersonate trusted entities within or outside an organization. Forensic a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 10 - Detecting and Preventing Phishing Attacks
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42
Send us a Text Message. Quotes: "Phishing targets the human element, the 'wetware,' often the weakest link in any security chain." - Clint Marsden "Phishing isn't just about poorly spelled emails anymore; it's about sophisticated campaigns that even cyber-aware individuals can fall victim to." - Clint Marsden "Effective defense against phishing inv…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unlocking The Power Of Digital Forensics Training And Certification With Magnet Forensics
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56
Chuck Cobb from Magnet Forensics joins the Forensic Focus Podcast to discuss training and certification. Chuck delves into his extensive background, including his tenure in law enforcement and over a decade of experience in forensic training at both Guidance Software and Magnet. He emphasizes the evolution of forensic training, particularly highlig…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 103 | Jean-Philippe Noat | Digital Intelligence
1:01:15
1:01:15
Play later
Play later
Lists
Like
Liked
1:01:15
Forensics Talks Episode 103: Digital Intelligence with Jean-Philippe Noat Join us on Thursday, July 4, 2024, at 2 PM Eastern for an engaging episode of Forensics Talks! We're excited to welcome Jean-Philippe Noat, a renowned international cyber security and forensic expert. Jean-Philippe has extensive experience as a Digital Intelligence Specialist…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Using digital forensics in cybersecurity at Unit 42
26:11
26:11
Play later
Play later
Lists
Like
Liked
26:11
Palo Alto Networks’ Unit 42 is determined to protect the digital world by helping customers understand their adversaries and defend against them. They use a practice called digital forensics to better detect, track, analyze and stop cyberthreats. Shelby Skrhak talks to Kraig Faulkner, channel systems engineer at Palo Alto Networks about: Unit 42’s …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Due Diligence, Password Cracking & New Tool Features
1:23:26
1:23:26
Play later
Play later
Lists
Like
Liked
1:23:26
Send us a Text Message. Welcome back to another episode of the Digital Forensics Now podcast! In this episode, we explore the critical need for continuous learning in the field, discuss fascinating forensic tools, showcase UFADE with its new chat capture feature, and engage in a spirited debate on the value of certifications. Get ready to expand yo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 157: Practice CISSP Questions - AI in Cybersecurity and Digital Forensics (Domain 7)
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13
Send us a Text Message. Can AI revolutionize your cybersecurity career? Join me, Sean Gerber, on today's thrilling episode of the CISSP Cyber Training Podcast as we uncover the transformative impact of artificial intelligence on cybersecurity jobs, based on a revealing article by Joe McKendrick from ZDNet. With 88% of cybersecurity professionals pr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 079 Craig Pedersen: Digital Forensic Investigations and Crime Scene to Courtroom and author of 'Think Before You Click'
53:29
53:29
Play later
Play later
Lists
Like
Liked
53:29
Send us a Text Message. Speaker Bio: Craig Pedersen Craig Pedersen is a leading expert in digital forensics, cybercrime, and fraud investigation. As the head of TCG Forensics, he oversees operations in Cape Town and Pretoria, focusing on digital forensics and cybercrime. Craig is a Forensic Practitioner, and Cyber Crime Investigator with extensive …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Christian Faith, Economics, and Bitcoin Come Together! TGFB 2024 Conference in Nashville!
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14
I’m excited to share this special "on the road" episode recorded at the "Bitcoin is for Everyone" conference in Portland, Oregon. Joining me are Ahshuwah Hawthorne, who has previously been on the show, and Nate Schultz, who has been working behind the scenes to help churches and missions organizations understand Bitcoin. You'll learn about the upco…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Combating The Rise Of AI-Generated Child Exploitation Material With Heather Barnhart
51:41
51:41
Play later
Play later
Lists
Like
Liked
51:41
Heather Barnhart from Cellebrite joins the Forensic Focus Podcast to discuss combating the rise of AI-generated child exploitation material. Heather shares her extensive experience and insights on the impact of AI and deepfakes on investigations, the challenges faced by law enforcement worldwide, and the importance of education in combating digital…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP56 Nadine Maggi Managing Director : From Forensic Science Dream to Armed Forces/Military Service & Leadership Success
55:33
55:33
Play later
Play later
Lists
Like
Liked
55:33
Send us a Text Message. EP56 Nadine Maggi , Managing Director of Sweet Freedom What if your unconventional career path could lead you to an unexpected yet fulfilling destination? Join us as we sit down with Nadine Maggi, the inspiring Managing Director of Sweet Freedom, who opens up about her incredible journey from aspiring forensic scientist to m…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 160: Contractual Law, Cybersecurity Legislation, and Computer Crimes (CISSP D1)
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32
Send us a Text Message. How does understanding the legal landscape in cybersecurity elevate your professional game? Join us on this episode of the CISSP Cyber Training Podcast as we unpack the complexities of civil, criminal, administrative, and contractual law. Learn how each legal category influences risk assessments, organizational policies, and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 082 Andrii Lukashenko: A Boots on the Ground Security Update from the Ukraine
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57
Send us a Text Message. Andrii Lukashenko BIO Andrii Lukashenko is a security and risk management professional with over a decade of experience in managing security and crisis situations. He has worked in various leadership roles for international organizations, private companies, and academic institutions. In November 2022, Lukashenko founded Smar…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 159: Practice CISSP Questions - Assess the Effectiveness of Software Security (Domain 8.3)
19:02
19:02
Play later
Play later
Lists
Like
Liked
19:02
Send us a Text Message. Ready to fortify your software development practices against security risks? Join us as we unearth critical strategies for mitigating vulnerabilities in your code. From the seamless integration of Static Application Security Testing (SAST) into your CI/CD pipelines to refactoring code to eliminate buffer overflow issues, thi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Beyond Pentesting Ep 3 ft. Divakar Prayaga | Entrepreneurship and Cyber Security
43:37
43:37
Play later
Play later
Lists
Like
Liked
43:37
In this episode of 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐁𝐞𝐲𝐨𝐧𝐝 𝐏𝐞𝐧𝐭𝐞𝐬𝐭𝐢𝐧𝐠, we have 𝐃𝐢𝐯𝐚𝐤𝐚𝐫 𝐏𝐫𝐚𝐲𝐚𝐠𝐚 joining us as a guest. Divakar is a seasoned leader with nearly two decades of robust experience managing cyber risks across different business functions. He has built cyber defence capability ground up 5 times hiring & nurturing high-performance teams for Banking & Fintec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Henrietta Brealey - Steady business in a rapidly changing society
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17
From intern to CEO, Henrietta Brealey has an unwavering belief in the Greater Birmingham Chambers of Commerce's mission of connecting and empowering local businesses. With a three-year transformation plan post-COVID, find out how the GBCC are driving innovation and global connections for businesses. (00:00) - The F5 Intro (00:50) - Henrietta Breale…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Revolutionizing Dispute Resolution: AAA's Acquisition of ODR.com & The Future of AI-Powered Arbitration
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11
This episode involves two people with very distinguished careers. Bridget M. McCormack who now heads the American Arbitration Association (AAA) and Colin Rule, the founder of ODR.com just acquired by The AAA. Bridget has served in just about every role you can in the legal industry. She started her legal career in legal aid and as a public defender…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dispute Resolution Conversation - Dispute Resolution in the PRC and offshore markets: Strategies for navigating turbulent times
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35
Appleby Asia Talks S02 E06 In this episode of Appleby’s Asia Talks, The Dispute Resolution team discusses the rising distressed debts and investment losses in the PRC market, as well as the PRC data security concerns over a recent Cayman Islands case. They also highlight a number of key rule changes in the British Virgin Islands and share insights …
…
continue reading
Remote Desktop Protocol (RDP) is a crucial artifact in digital forensics due to its extensive use for remote system access. Analyzing RDP activities can uncover vital information about unauthorized access, insider threats, and attacker lateral movement within a network. Forensic examination of RDP logs enables investigators to trace an attacker's s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 158: Assess the Effectiveness of Software Security (CISSP Domain 8.3)
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42
Send us a Text Message. Ever wondered how a data breach could impact cloud security, or what measures you need to take to secure sensitive information? Join us in this episode of the CISSP Cyber Training Podcast as we break down the recent AT&T data breach and its implications on cloud environments like AWS and Snowflake. Discover how attackers gai…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP55 Sara Russell: Founder The Women's Domain & Empowering Women in Business
36:24
36:24
Play later
Play later
Lists
Like
Liked
36:24
Send us a Text Message. My next guest is Sara Russell, Marketing Director at 5874 Commerce & Founder of The Women Domain Learn about the inspiring journey of the Women's Domain, a community founded by Sarah to integrate more women into the e-commerce community Join us as we celebrate empowerment through networking and continuous learning. Sarah int…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dewatering processes, cognitive therapeutics for Alzheimer's disease and blood tests for chronic diseases
51:23
51:23
Play later
Play later
Lists
Like
Liked
51:23
With Dr Shane away in Cairns this week, the rains of the show are in Dr Jenny, Dr Euan and Dr Ray’s hands. They are joined in the studio by this week’s guests Dr Shane Usher, Research fellow in the Minerals Centre of Excellent at the University of Melbourne, talking about the processes of solid-liquid separation and the importance for mining, water…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Detecting and dealing with deepfakes and synthetic media in your investigation
59:12
59:12
Play later
Play later
Lists
Like
Liked
59:12
Join Kevin as he speaks with Brandon Epstein of Medex Forensics about how to determine the trustworthiness of digital evidence and to know when a video has been edited or modified, and to recognize original camera video from synthetically produced media. https://medexforensics.com/ https://www.swgde.org/…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26
Send us a Text Message. Episode Title: "Unmasking APT40: Tactics, Challenges, and Defense Strategies" Key Takeaways: APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009. They target various sectors including academia, aerospace, defense, healthcare, and maritime industries. APT40 uses advanced tactics such as sp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 081 Leigh Turner: 'My mission to expose rogue security operators that give the industry a bad name
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05
Send us a Text Message. BIO CEO/Founder: Elite Tactical Force LTD │ Ambassador/Rep: Security Industry Federation │ Course Writer: Alison │ Partner: Tactical Group │ CEO: E.T.F.A - Education. Training. Facility. Assessment │ CEO: Project Dreams Chief Executive Officer of Elite Tactical Force Limited & Elite Tactical Force Academy. https://www.linked…
…
continue reading
On this episode of the SecureAF Podcast, Keelan Knox interviews our 2024 interns. They share insights on how they got in, what they are learning, and where this will take them. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywhere you get you're …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
ShadowDragon OSINT Geopolitics Podcast - Unveiling Meliorator: Russian AI's Role in Global Disinformation
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03
ShadowDragon OSINT Geopolitics and More Podcast Summary Host: Nico Dekens, “The Dutch OSINT Guy” (follow Nico on X: @dutch_osintguy) Episode Focus: Critical cybersecurity advisory on state-sponsored Russian media using advanced software for foreign malign influence activities. Key Points Covered: Introduction: The episode delves into a joint cybers…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Bitcoin Solves Financial Challenges for Missionaries in Developing Countries
36:59
36:59
Play later
Play later
Lists
Like
Liked
36:59
Missionaries often encounter broken monetary systems, especially in regions far from the stability of the US dollar. In this episode, I'm joined by Ahshuwah Hawthorne and Nate Schultz to discuss an exciting intersection of Bitcoin and missionary work. We dive into the financial challenges missionaries face and explore how Bitcoin offers innovative …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Declan Allen - Driving change in the automotive industry
21:16
21:16
Play later
Play later
Lists
Like
Liked
21:16
On this episode we welcome Declan Allen, the Managing Director of HORIBA MIRA and Corporate Officer of HORIBA Group. Before revolutionising HORIBA MIRA, Declan played a key role at Mercedes Benz High Performance Engines Ltd, driving innovation in engine assembly and kinetic energy recovery systems for leading F1 teams. With a knack for leveraging c…
…
continue reading
Your smart phone keeps busy, even when you're not on it. Apps are constantly downloading data–thumbnails, ad content, new posts–at a surprising frequency, even when you're not actively using the app. These downloads can lead to your download data making it look like you're using your phone when you're not. In this episode, I pull a story from my da…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OpenAI Disrupts Covert Influence Operations With The Help of OSINT
8:30
8:30
Play later
Play later
Lists
Like
Liked
8:30
Key Points Discussed: • Monitoring and Disruption Efforts: OpenAI collaborates with open-source intelligence practitioners to monitor internet activity and identify potential misuse of their language models by nation-states and other actors. They aim to disrupt sophisticated threats through continuous improvements in their safety systems and collab…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
ShadowDragon Special Edition Podcast: Terrorist Threats, French Elections, and Political Protests
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10
The Shadow Dragon Special Edition Podcast Introduction: The podcast covers open source intelligence (OSINT) and geopolitics. Topics include military bases on alert, global protests, and elections. Military Alert in Europe: Several U.S. military bases in Europe are on heightened alert (state of alert Charlie, second highest level). The alert is due …
…
continue reading
This week, I will be discussing the Linux operating system from a DFIR perspective. It is highly recommended for every examiner to become proficient in Linux, especially with the increasing prevalence of cloud-based infrastructures in enterprise environments. As these platforms become the norm, you can expect to encounter Linux systems frequently d…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 156: Security Configuration Management, Change and Communication Best Practices (Domain 7.3)
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46
Send us a Text Message. Is a four-year college degree necessary to break into the world of cybersecurity? Discover why practical experience and industry certifications might just be your golden ticket to a thriving career in IT. In this episode of the CISSP Cyber Training Podcast, host Sean Gerber unpacks Domain 7.3 of the CISSP exam, emphasizing t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and printer forensics ...
18:35
18:35
Play later
Play later
Lists
Like
Liked
18:35
Send us a Text Message. In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget. Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. Event log cleared: Event ID 1102 ACSC Sysmon: ht…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Digital Tai Chi, Parkinson’s Disease and Childhood Stuttering
53:09
53:09
Play later
Play later
Lists
Like
Liked
53:09
Presenter Dr Shane brings the latest science news; Julia Zhu, a physiotherapist and PhD candidate in the Department of Physiotherapy at the University of Melbourne talks about how the traditional Chinese exercise of Tai Chi has shown great benefits for improving the symptoms of osteoarthritis when done in-person, and her research looks into the ben…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Setting The Standard For Image And Video Forensics In The US With Amped Software
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10
Blake Sawyer from Amped Software joins the Forensic Focus Podcast to discuss video and image forensics in the US. He shares insights on the challenges of working with low-quality CCTV footage and how Amped Software has grown and been adopted in the US market. The conversation delves into the role of the Scientific Working Group on Digital Evidence …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Exploring Palo Alto’s Pre-Packaged Bundles
15:38
15:38
Play later
Play later
Lists
Like
Liked
15:38
SMBs tend to require speedy turnarounds and easy access to support, making them an ideal market for one-stop shops and pre-packaged bundles. Luckily, Palo Alto Networks is on the case. Shelby Skrhak speaks with Meghan Mack, vendor, business manager at Ingram Micro, about: Why Palo Alto Networks’ pre-packaged bundles are game changers How Palo Alto …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Anthony Allcock - How tech enables business growth and better lives
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:44
Anthony Allcock became one of the UK’s Top 100 CIOs in 2023, with over 25 years’ experience in business transformation and IT with Rolls Royce, British Airways, and Ingeus. In this episode we discuss how to successfully transform businesses for growth, and how to put your people values at the heart of the strategy. (00:00) - The F5 Intro (00:50) - …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 155: Practice CISSP Questions - Security Assessments, Account Management, Backup Verification (Domain 6)
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Send us a Text Message. Ever wondered how to secure your SaaS environment while mastering essential security testing techniques? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we navigate the complexities of cybersecurity, starting off with some personal July 4th reflections and an insightful Forbes article on the pressing threats and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Innovation as a Team Sport: The Importance of Collaboration in Legal Teams (Dr. Heidi Gardner - Harvard Law / School of Business) (REPLAY)
49:08
49:08
Play later
Play later
Lists
Like
Liked
49:08
Dr. Heidi Gardner of the Harvard Business and Law Schools joins the podcast to talk about about latest book Smarter Collaboration and the importance of collaboration in legal teams and in all organizations generally. Smarter Collaboration is Dr. Gardner’s second book and a follow up to Smart Collaboration: How Professionals and Their Firms Succeed …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 080 Kasia Hanson, Global Senior Director Physical and Cybersecurity Ecosystems at Intel Corporation talks about Security Convergence
56:26
56:26
Play later
Play later
Lists
Like
Liked
56:26
Send us a Text Message. Kasia Hanson, Global Senior Director | Physical and Cybersecurity Ecosystems at Intel Corporation Kasia Hanson leads Global Security Ecosystem Development and Partnerships within Intel’s Security Center of Excellence. She is responsible for shaping the strategy, orchestration, and go-to-market with ecosystem. She is a passio…
…
continue reading