Best computer forensics podcasts we could find (Updated July 2018)
Related podcasts: Forensics Tech Malware Computers Computer Crime Business Gadgets Science Society Education Socreports Riskassessments Pcireports Informationsecurityconsulting Hitrust Hipaacompliance Ransomware Crime Writer Crime Scene Investigation  
Computer forensics public [search 0]
show episodes
 
Security and Forensic Computing module from Edinburgh Napier University
 
S
SecuraBit
Monthly
 
SecuraBit Before It Bytes!
 
My Hard Drive Died - Podnutz
 
Welcome to the wonderful world of digital and computer forensics. In each episode Lee will have guests on the show to discuss the latest news in the field, tell stories from the real world, and much more.
 
T
Talk Forensics
Weekly
 
Forensics science discussion in all disciplines. With experts in the various fields of forensics taking calls from listeners
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
 
D
Digital Detectives
Monthly
 
Hosted by two leaders in the cyber-security industry, Sharon D. Nelson, Esq. and John W. Simek, Digital Detectives is for listeners who are interested in digital forensics, e-discovery, and information security issues. Nelson and Simek invite digital forensic and computer security experts to enlighten listeners on the latest technology, cyber threats, and necessary security measures to keep online data secure.
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, encapsulation, data structures, databases, memory management, software development, virtualization, and websites. Languages include C, PHP, and JavaScript plus SQL, CSS, and XHTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. De ...
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
C
CS50 2014
Weekly
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web development. Languages include C, PHP, and JavaScript plus SQL, CSS, and HTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. ...
 
Ever feel like it's getting tougher to find any semblance of the real world coming from the media? You're not alone. While most people are not yet fully aware of the extent to which computer-generated fake environments and synthetic humans are used by dominant media in the largest world news stories, we are. CluesForum is a "media-safe" space where you are not pressured to believe in the creepy, technically imperfect computer-generated news imagery. Instead, we plant our feet firmly in the E ...
 
Loading …
show series
 
In a previous podcast, we discussed purple-teaming as it compares to a conventional penetration test. Let’s now build on that approach, starting with the differences between attack simulation and conventional penetration tests. The methodology of attack simulation is the assumption that the network or a system will become compromised and the ...…
 
This week I talk about the value of Grep as a forensic skillset
 
Most penetration testers are considered “red team,â€� while most defenders are considered “blue team.â€� Thus, the irony of a conventional penetration test is that these two groups are typically pitted against each other. When the red teams and blue teams are working together, you have what’s called a “purple team.â€� While purple-teami ...…
 
This week I talk about distributed password cracking with Hashtopolis for Hashcat
 
This week I talk about the security changes coming with iOS 11.4
 
Virtual assistants market themselves by saying they will save you time and money, but the reality is working with them comes with its own set of cybersecurity risks. In this episode of Digital Detectives, hosts Sharon Nelson and John Simek talk to Tom Lambotte about the data dangers involved with using virtual assistants and what lawyers can do ...…
 
This week I talk about IP address and domain triage for computer forensic investigations.
 
This week I talk about ATT&CK for Enterprise
 
This week I talk about getting started in scripting
 
This week I talk about Rita, a free Threat Hunting Tool from Black Hills Information Security
 
Having the ability to break into a terrorist’s phone sounds good, but what happens when the FBI’s access to your phone leaves you vulnerable to cyber attacks? In this episode of Digital Detectives, hosts Sharon Nelson and John Simek talk to Nate Cardozo about the FBI’s stance on encryption including their desired ability to access our phones, t ...…
 
This week I talk about Linux triage using the /.bash_history artifact
 
This week I review two tools for extracting and parsing USNJRNL evidence.
 
The EU’s General Data Protection Regulation (GDPR) permits users certain rights (referred to as “data subject access rightsâ€� or “DSARsâ€� in the documentation) that organizations will need to be prepared to accommodate if they must comply with GDPR. For organizations to be prepared to respond, it’s important to have a clear understand ...…
 
As organizations determine whether the E.U.’s General Data Protection Regulation (GDPR) is applicable to them, there are several important things to consider when it comes to compliance. Among those things involves preparing for and responding to personal data breaches which is not just a requirement of the GDPR; it’s a good business practi ...…
 
As the May 25, 2018 GDPR enforcement date fast approaches, many organizations are asking, “How does the GDPR will apply to my organization?â€� As the GDPR extends to U.S. organizations that offer services to or monitor behaviors of E.U. citizens, it’s important to understand how to classify your organization’s data to determine GDPR appli ...…
 
This week I talk about a clever way to leverage Volatility to triage malware on a target system
 
This week I talk about 6 different prefetch tools that are FREE!
 
This week I talk about keeping up with attack intelligence.
 
As artificial intelligence (AI) becomes more prevalent and useful, most industries are looking for ways it can benefit them; law firms are lagging behind in dedicating the time and resources to make AI work for them. In this episode of Digital Detectives, Sharon Nelson and John Simek talk to Ed Walters about AI Sandbox, Fastcase’s new artificia ...…
 
The question is not, “Will your employees will get your company hacked?â€� but rather “When will your employees get your company hacked?â€� A recent article from HITECH Answers highlights this sad reality of human-error being the most common reason for a cyber intrusion and data compromise. So, while employee actions can circumvent most eve ...…
 
This week I do a tool review of CYLR and CDQR - perhaps the easiest way to build an awesome timeline
 
In a recent report from Wombat Security Technologies based on data from millions of simulated phishing attacks, it was found that 76% of organizations said they experienced phishing attacks in 2017, and nearly half of information security professionals said that the rate of attacks increased from 2016 to 2017. F-Secure also recently released re ...…
 
When cloud-managed security was first introduced, there was some concern about the levels of security as compared to the security of data on an organization’s premises. Today, security professionals have implemented the appropriate controls to help could-based data management be safe and effective. As many organizations are now embracing and ...…
 
This week I talk how common ports plays into network forensics.
 
Simon Shack, patrix, kham and hoi.polloi are Team Tychos. Listen as they catch up about general matters first, then gradually introduce you to the TYCHOS, the most accurate solar system model ever devised in known history, and some of its most amazing points
 
This week I go over some Network Forensic artifacts and what they offer to an investigation.
 
“It’s all too easy to step off a precipice without ever realizing you were on a precipice.” - Sharon Nelson The field of e-discovery is constantly changing, and there are many new and old ways to get into trouble as a litigator. In this episode of Digital Detectives, Sharon Nelson and John Simek discuss some of the most common reasons lawyers r ...…
 
This week I review two freely available forensic tools from Foxton Forensics
 
This week I talk about OLEDump, a malware analysis tool for investigating suspicious macros in MS Office documents
 
No matter the industry—government, healthcare, financial, or even smaller, mom-and-pop businesses—each deal with some type of sensitive customer information, and each has decisions to make when it comes to managing risk. Most security and audit frameworks (HIPAA, ISO, PCI, NIST, SOC 2, etc.) have requirements for risk assessment, making the ...…
 
This week I talk about Cutter, a static malware analysis tool by Radare
 
In the information security world, we all wish we had more access to senior executives. Following that logic, if you’re responsible for security at your organization, and you are lucky enough to ride on the same elevator with a senior executive from your company, you should be prepared with your “elevator pitchâ€� on what to say about impro ...…
 
The AICPA Cybersecurity Working Group brought to life a new type of cybersecurity examination report in 2017 known as SOC (System and Organization Control) for Cybersecurity. These reports are intended to provide a consistent approach for evaluating and reporting on an entity’s cybersecurity risk management program and give management the abi ...…
 
Cyber threats can often seem like a distant threat and cyber insurance an overzealous safety measure. But as technology becomes more and more a central part of any legal practice, cyber insurance is becoming increasingly vital to a company’s financial health. In this Digital Detectives, hosts Sharon Nelson and John Simek talk to Judy Selby abou ...…
 
This week I go over an easy way to get set-up to start using crypto-currency to testing \ validation \ and self-training purposes
 
This week I interview an industry expert about mobile device JTAG and ISP forensics.
 
This week I talk about the userassist artifact for file use and knowledge investigations.
 
This week I talk about resolving USB usage back to specific systems and user accounts.
 
When reading the preservation letter in which President Trump’s lawyer addressed the publication of Fire and Fury, Craig Ball noticed that the writing was very familiar. In fact, the last six pages of the letter were taken straight from Craig’s article “The Sincerest Form of Flattery,” grammar quirks and all. In this episode of Digital Detectiv ...…
 
This week I talk about Windows Explorer evidence.
 
Incident response consultants are often contacted by clients who are in complete shock that their systems or networks have been compromised. Many times, these clients are hoping our analysis will ultimately prove that the incident was just a “flesh woundâ€� to their systems and that they didn’t experience an actual data breach. It’s quite ...…
 
This week I continue the back to basics series with talk on the Windows Shimcache.
 
In comparison to previous years, 2017 was a good year as the number of healthcare records compromised was significantly down. As of December 30, there had been 341 breaches reported, affecting a little less than 5 million individuals. This compares to 327 breach reports in 2016 but with 16.6 million individuals affected. When this information i ...…
 
This week it's a refresher on the Windows Prefetch, a core Microsoft artifact every examiner should know.
 
This week I kick off a revisit of the fundamentals helpful to all new examiners.
 
Since Trump’s executive decisions regarding immigration, U.S. border security has taken steps to reflect the changes in legislation. One of the actions taken was the increased search of travelers’ phones and other electronic devices by border agents. In this episode of Digital Detectives, hosts Sharon Nelson and John Simek talk to Sophia Cope a ...…
 
This week I go over some "go to" Windows Event Logs.
 
Google login Twitter login Classic login