Best computer forensics podcasts we could find (Updated November 2017)
Related podcasts: Forensics Tech Computer Forensics Business Expert Witness Security Digital Forensics Csi Malware Computers Computer Crime Education Gadgets Science Society Socreports Riskassessments Pcireports Informationsecurityconsulting Hitrust  
Computer forensics public [search 0]
show episodes
 
S
Security and Forensic Computing (iPod Version)
 
Security and Forensic Computing module from Edinburgh Napier University
 
S
SecuraBit
Monthly
 
SecuraBit Before It Bytes!
 
S
Security and Forensic Computing (iPod Version)
 
Security and Forensic Computing module from Edinburgh Napier University
 
T
Talk Forensics
Weekly
 
Forensics science discussion in all disciplines. With experts in the various fields of forensics taking calls from listeners
 
M
My Hard Drive Died - Podnutz
Rare
 
My Hard Drive Died - Podnutz
 
F
Forensic 4cast » Forensic 4cast
Rare
 
Welcome to the wonderful world of digital and computer forensics. In each episode Lee will have guests on the show to discuss the latest news in the field, tell stories from the real world, and much more.
 
C
CyberSpeak's Podcast
Rare
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
D
Digital Forensic Survival Podcast
 
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
 
D
Digital Detectives
Monthly
 
Hosted by two leaders in the cyber-security industry, Sharon D. Nelson, Esq. and John W. Simek, Digital Detectives is for listeners who are interested in digital forensics, e-discovery, and information security issues. Nelson and Simek invite digital forensic and computer security experts to enlighten listeners on the latest technology, cyber threats, and necessary security measures to keep online data secure.
 
C
CyberSpeak's Podcast
Rare
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
E
ESIBytes - E-Discovery Tips by Experts
 
ESI Bytes is a series of podcasts designed to highlight electronic discovery or e-discovery experts and their theories on the topic as a source of free information to gain insights into this growing field. We will interview a collection of attorneys, technologists, forensic and record management experts to provide an introduction for many to these experts as well as some access to their opinions. This show is sponsored by JurInnov, a Legal Technology Company. However all the opinions express ...
 
H
Harvard College's Computer Science 50: Introduction to Computer Science I
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, encapsulation, data structures, databases, memory management, software development, virtualization, and websites. Languages include C, PHP, and JavaScript plus SQL, CSS, and XHTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. De ...
 
C
Cybersecurity Sense
Monthly+
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
T
This is CS50 2014.
Weekly
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web development. Languages include C, PHP, and JavaScript plus SQL, CSS, and HTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. ...
 
T
The Clues Chronicle
Rare
 
Ever feel like it's getting tougher to find any semblance of the real world coming from the media? You're not alone. While most people are not yet fully aware of the extent to which computer-generated fake environments and synthetic humans are used by dominant media in the largest world news stories, we are. CluesForum is a "media-safe" space where you are not pressured to believe in the creepy, technically imperfect computer-generated news imagery. Instead, we plant our feet firmly in the E ...
 
Loading …
show series
 
Susan Cox Powell's family hopes efforts to peer into an encrypted computer hard drive will give them answers about what happened to the Utah mother who disappeared in 2009. The computer belonged to her husband Josh Powell who later killed their two sons and himself. Susan's sister Denise Ernst, Cox family lawyer Anne Bremner and Cox family inve ...…
 
Adrienne s career list 2000 present: Professor of religion Zoologist Forensic psychologist Full-time artist painter (gallery) or digital art Webcam star Fashion designer Computer programmer Studio musician Adrienne dressed as Ozzy Osbourne at her sister Andrea’s 70s-themed birthday party © August 1999 The post Better Off Bald: Episode 33 Days 1 ...…
 
shutterstock There aren’t many places you can find musical robots, an Arctic smellscape and an art gallery for babies. But for one week in September, all of these and more were in Brighton for the annual British Science Festival. Naturally curious, The Conversation went along. Our team of editors spoke to many of the academics appearing at the ...…
 
S
Security and Forensic Computing (iPod Version)
 
This is a lecture on encryption
 
S
Security and Forensic Computing (iPod Version)
 
This is a lecture on software security
 
S
Security and Forensic Computing (iPod Version)
 
This is a lecture on network security
 
S
Security and Forensic Computing (iPod Version)
 
This is a lecture on some security fundamentals
 
S
Security and Forensic Computing (iPod Version)
 
This is a lecture on IDS
 
S
Security and Forensic Computing (iPod Version)
 
This is a lecture on authentication
 
Brett Shavers is a consultant to corporations and government agencies in computer related cases as well as being the author of “Placing the Suspect Behind the Keyboard“, co-author of “Hiding Behind the Keyboard” and co-author of the “X-Ways Forensics Practitioner’s Guide.” Brett began his career as a digital forensics investigator in law enforc ...…
 
Brett Shavers is a consultant to corporations and government agencies in computer related cases as well as being the author of “Placing the Suspect Behind the Keyboard“, co-author of “Hiding Behind the Keyboard” and co-author of the “X-Ways Forensics Practitioner’s Guide.” Brett began his career as a digital forensics investigator in law enforc ...…
 
C
Challenging the Rhetoric with Cheri Roberts
 
Join Cheri Roberts WEDS. July 12 @ 5pPST/8pEST LIVE with "I am Jane Doe" documentary filmmaker, Mary Mazzio, attorney, Erik Bauer, and cybercrime computer forensics expert, Frederick Lane, to discuss Section 230 of the Communications Decency Act (CDA), an internet freedom law that provides a safe haven for website publishers to advertise undera ...…
 
In many lines of employment, the advent of high-speed internet and the cellular phone network has made “the office” obsolete — people can successfully do their work from a coffee shop or from their living room. Police work is obviously much more dependent on being present out in the public, but cops too can do a number of tasks remotely. They c ...…
 
Lawrence Abrams is the creator and CEO of Bleeping Computer, and he and I delve into the latest malware sweeping the globe called NotPetya (among other things). The supposed ransomware appears to be just plain mean, destroying all the data on your hard drive whether you pay the ransom or not. We’ll tell you what you need to know, including how ...…
 
Thursday's edition of Trending Today USA was hosted by Liftable Media's Ernie Brown.In this half hour, the guests and topics discussed were:1. The Top 5 Trending Stories2. Chris Versace (CIO, Tematica Research) -- U.S. Ambassador to the United Nations Nikki Haley on Wednesday called for the cessation of trade with any nation that continues to d ...…
 
W
WashingTECH Tech Policy Podcast with Joe Miller
 
America's History of Recalcitrance De jure discrimination Racism online is evolving in a way that is consistent with the way racism has always evolved--from explicit to subtle. Plaintiff-side civil rights lawyers have found it easiest to win -- if civil rights cases can ever said to be "easy"-- in cases in which they can convincingly demonstrat ...…
 
David A. Duryea is business improvement veteran with more than thirty-two years of experience in practical business improvement and technology innovation. He has led more than sixty business improvement and innovation projects in sixteen different industries. As a legal expert witness for failed technology and business innovation projects, Davi ...…
 
George Whitesides is a pioneer of soft robotics. His latest research expands the boundaries of soft robotics with a spider-like robot made out of drinking straws. He joins Click to discuss its challenges and complexities. Researchers are exploring how robots might imitate the life of salps – squishy tube-shaped marine organisms. Hemma Philamore ...…
 
Just Blood SpatterIn episode nine of Just Science, funded by the National Institute of Justice’s Forensic Technology Center of Excellence [Award 2016-MU-BX-K110], we spoke with Dr. Marc Smith, from the Georgia Institute of Technology. Dr. Smith’s NIJ funded research in blood spatter has connected computational fluid dynamics with empirical stud ...…
 
DNA Mixture Interpretation In the fifth episode of Just Science, funded by the National Institute of Justice’s Forensic Technology Center of Excellence [Award 2016-MU-BX-K110], we have guest speaker Dr. Catherine Grgicak speaking about one of the hot topics in forensic science, DNA Mixture interpretation. Dr. Grgicak and her colleagues at Bosto ...…
 
A look at efforts to improve forensics after the death of a key federal commission. Plus, when should the government alert the computer industry about software flaws that could become cyberweapons? And the story of meteorite hunter Nina Lanza, and what life is really like in Antarctica.
 
Earlier today we reported that Seth Rich, according to Private Investigator, was the source for WIKILEAKS. Ever since, mainstream media has been attempting to firestorm the situation with propaganda and distractions.From ZeroHedge:The Democratic National Committee staffer who was gunned down on July 10 on a Washington, D.C., street just steps f ...…
 
M
Modern Life Network - Content as it relates to your life
 
Lane is an author, attorney, expert witness, and professional speaker on the legal and cultural implications of emerging technology, with a particular focus on law, privacy, cybersafety, and ethics. A graduating from Amherst College and Boston College Law School, his experience as a law clerk and later private practitioner, led him to launching ...…
 
Lane is an author, attorney, expert witness, and professional speaker on the legal and cultural implications of emerging technology, with a particular focus on law, privacy, cybersafety, and ethics. A graduating from Amherst College and Boston College Law School, his experience as a law clerk and later private practitioner, led him to launching ...…
 
M
Modern Life Podcast Network
 
Lane is an author, attorney, expert witness, and professional speaker on the legal and cultural implications of emerging technology, with a particular focus on law, privacy, cybersafety, and ethics. A graduating from Amherst College and Boston College Law School, his experience as a law clerk and later private practitioner, led him to launching ...…
 
M
Modern Life Network - Content as it relates to your life
 
Lane is an author, attorney, expert witness, and professional speaker on the legal and cultural implications of emerging technology, with a particular focus on law, privacy, cybersafety, and ethics. A graduating from Amherst College and Boston College Law School, his experience as a law clerk and later private practitioner, led him to launching ...…
 
In this episode: Alex interviews the Highlands Ranch High School CyberPatriots team, Robb and Alex re-cap the best RMISC yet, and news from Xcel Energy, Ping Identity, LogRhythm, and a breach in Larimer County. Full show notes here: https://www.colorado-security.com/news/2017/5/12/15-515-show-notesRMISC Recap - And meet some CyberPatriotsAhhhh. ...…
 
Welcome to episode 62, this month coming through the miracle of restream In this episode Middlemeister has unfortunately gone ill so its back down to Skazz and TheSuffolkRam to keep things in order. Ram has been chatting to a lonely 1980s AI in Event[0] in order to get home to earth. A enjoyable but very short expensive game so hes not got alot ...…
 
You bought your car, but you can't repair it. Computer Forensic expert Scott Moulton joins Liz to discuss the implications of hard drives, software, copyrights, and the open road.By david@americaswebradio.com.
 
Malware is big business, both from the people using it, to the people who sell companies blinky boxes to companies saying that they scare off bad guys. The latest marketdroid speak appears to be the term 'fileless malware', which by definition... FTA: “Malware from a "fileless" attack is so-called because it resides solely in memory, with comma ...…
 
Malware is big business, both from the people using it, to the people who sell companies blinky boxes to companies saying that they scare off bad guys. The latest marketdroid speak appears to be the term 'fileless malware', which by definition... FTA: “Malware from a "fileless" attack is so-called because it resides solely in memory, with comma ...…
 
Malware is big business, both from the people using it, to the people who sell companies blinky boxes to companies saying that they scare off bad guys. The latest marketdroid speak appears to be the term 'fileless malware', which by definition... FTA: “Malware from a "fileless" attack is so-called because it resides solely in memory, with comma ...…
 
A
Airplane Geeks Podcast
 
Aviation cybersecurity expert Dr. Remzi Seker from Embry-Riddle Aeronautical University.By thegeeks@airplanegeeks.com (Airplane Geeks).
 
A
Airplane Geeks Podcast
 
Aviation cybersecurity expert Dr. Remzi Seker from Embry-Riddle Aeronautical University.
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login