show episodes
 
Artwork

1
Forensic Focus

Forensic Focus: Digital Forensics, Incident Response, DFIR

Unsubscribe
Unsubscribe
Monthly+
 
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
  continue reading
 
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
  continue reading
 
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
  continue reading
 
Artwork

1
Digital Detectives

Legal Talk Network

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
Artwork

1
Buy Hold Sell

Evergreen Podcasts | CrossCheck Media

Unsubscribe
Unsubscribe
Weekly+
 
Buy Hold Sell is an American financial talk television show that airs weekly on various streaming channels. It is hosted by Veronica Dudo with permanent panelists, Tobin Smith and Todd M. Schoenberger, who are often joined by a rotating list of guest panelists. BHS is a rapid-fire, high-energy, financial news talk show addressing the events of the week on Wall Street and forecasting what investors should expect in the immediate future.
  continue reading
 
Artwork

1
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops

The Lead Tech Podcast | The Talk Show For Electronics Repair Shops

Unsubscribe
Unsubscribe
Daily+
 
Do you want to take your repair shop to the next level? Our owners helped grow some of the largest repair shops in the southeast including The Computer Warriors, Mr. Phix, Mobile Zone, and Smart Touch Repair Center. The Lead Tech Podcast aims to help you expand your offerings to data recovery, forensics, networking, board-level repair, and to deliver an unbelievable customer service experience. Become the largest repair shop in town and gain the competitive advantage.
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Podcast in which students in Mr. Lange's Computer Science courses have a platform to discuss what they are currently learning in their classes, innovative development projects students are completing during their Research & Development opportunities, technology related topics that are in the news and new amazing technologies coming into the market.
  continue reading
 
Artwork

1
omega tau - English only

Markus Voelter, Nora Ludewig

Unsubscribe
Unsubscribe
Monthly
 
How do scientists uncover phenomena and explain their connections? How do engineers design machines, methods and infrastructure? At omega tau, experts give detailed answers. Over the last ten years, we have produced over 350 episodes in which we dug deeper, until we ran out of questions. Join us on our journey through the world of science and engineering: the closer you look and listen, the more interesting things get.
  continue reading
 
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
  continue reading
 
Loading …
show series
 
Get ready for a deep dive into the dynamic world of finance with this week's episode of "The Weekly MoneyClip," premiering March 25th. Join our esteemed panel of financial experts, including Tom Hayes, Mitch Roschelle, Josh Hammer, Scott Stantis, and Jake Novak, as they unpack the latest market earthquakes and unveil hidden economic gems. From the …
  continue reading
 
Sophie Powell joins Si and Desi on the Forensic Focus Podcast to discuss various topics including her recent participation in a TryHackMe webinar, the challenges of applying for graduate schemes, and the relevance of the Cyber 9/12 competition to her career in cybersecurity. They also touch on the psychology of conspiracy theories and the implicati…
  continue reading
 
Ryan Murray is the Deputy Director of Arizona Homeland Security and Chief Information Security Officer of Arizona. We talk about a wide range of cybersecurity issues facing the State of Arizona from DeepFakes, AI powered Hackers, to Chinese State Sponsored Hackers positioning themselves in Critical Infrastructure. Chapters: 0:00 The Journey to Beco…
  continue reading
 
This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation. Effective incident response is paramount, and preparation is the key to success. This preparation includes comprehensive documentation, training, having the right tools and resources in place, and developing incident response plans and playbooks. It also …
  continue reading
 
Guest: Ahmad Robinson, Cloud Security Architect, Google Cloud Topics: You’ve done a BlackHat webinar where you discuss a Pets vs Cattle mentality when it comes to cloud operations. Can you explain this mentality and how it applies to security? What in your past led you to these insights? Tell us more about your background and your journey to Google…
  continue reading
 
In this episode of OCA Community Connect, we speak with Md Saroer-E Azam, a software developer at IBM and a key maintainer/contributor to STIX Shifter. The focus of today's discussion is the STIX Shifter project, an open-source python library designed to facilitate the connection and querying of diverse data sources no matter where they reside. It …
  continue reading
 
Today I'm talking Windows forensics, focusing on Windows event logs. These logs are very valuable for fast triage, often readily available in your organization's SIEM. But have you ever wondered about the processes enabling this quick access? Not only are the logs automatically collected and fed into the appliance, but they are also formatted and n…
  continue reading
 
Join Todd M. Schoenberger and Tobin Smith on "Buy Hold Sell" as they welcome Timothy Kramer, Founder and CEO of CNIC Funds, for an exclusive discussion on their groundbreaking approach to commodity investing. Discover how CNIC Funds is transforming the investment landscape with their innovative Electricity Index, designed to provide investors with …
  continue reading
 
Guest: Jennifer Fernick, Senor Staff Security Engineer and UTL, Google Topics: Since one of us (!) doesn't have a PhD in quantum mechanics, could you explain what a quantum computer is and how do we know they are on a credible path towards being real threats to cryptography? How soon do we need to worry about this one? We’ve heard that quantum comp…
  continue reading
 
Dive into the latest financial headlines with "The Weekly Money Clip"! In this episode, Scott Stantis analyzes the February Jobs Report's impact on inflation and housing affordability, while Ilya Shapiro and Mediaite's Sarah Rumpf weigh in on the TikTok saga from different angles. Simson Garfinkel explores the resurgence of analog computing and its…
  continue reading
 
Wynter Deagle is a Data Privacy and Cybersecurity Attorney out of California. She has proactively counseled companies and defended companies in data privacy litigation. She shares insights from her experience with us. Chapters: 0:00 How Data Privacy came to Light 4:08 Are you Opting in or Opting out? 6:16 Healthcare Companies have the Facebook Pixe…
  continue reading
 
Get ready for an electrifying episode of "Buy Hold Sell" as Wall Street's finest, Todd M. Schoenberger and Tobin Smith, sit down with Jay Hatfield, CIO of the ICAP and SCAP ETFs. Brace yourself for an insider's look into the future of the market as Jay shares his highly sought-after 2024 forecast for the S&P 500, delivering exclusive insights you w…
  continue reading
 
In this podcast episode, we talk about Linux's `memfd` – a virtual file system allowing the creation of anonymous memory areas for shared memory or temporary data storage. Threat actors exploit `memfd` for fileless malware attacks, as its memory areas exist only in RAM, evading traditional file-based detection methods. Join me as I `memfd` as a for…
  continue reading
 
Guest: Phil Venables, Vice President, Chief Information Security Officer (CISO) @ Google Cloud Topics: You had this epic 8 megatrends idea in 2021, where are we now with them? We now have 9 of them, what made you add this particular one (AI)? A lot of CISOs fear runaway AI. Hence good governance is key! What is your secret of success for AI governa…
  continue reading
 
Chris Doman, Co-Founder of Cado Security, joins the Forensic Focus podcast to discuss cloud forensics and incident response. Cado Security provides cloud-based software for collecting and analyzing forensic evidence in cloud environments. Chris discusses the challenges of cloud forensics, such as the constantly changing nature of cloud environments…
  continue reading
 
Delve into the latest economic revelations on "The Weekly Money Clip" for the week of March 11th. Join our expert panel featuring Scott Stantis, Jennifer Horn, Simson Garfinkle, and Jake Novak as they unravel crucial topics shaping the financial landscape. Scott Stantis provides a deep dive into the February Jobs Report, uncovering potential warnin…
  continue reading
 
Join Todd M. Schoenberger on this riveting episode of "Power Hour" as he welcomes Lieutenant Colonel Berney Flowers, running for a seat in the House of Representatives in Maryland's District 3. In this exclusive interview, Lt. Col. Flowers shares his sensational thoughts on pressing issues, including fiscal challenges in Washington, border security…
  continue reading
 
This week we explore into the world of Windows service event codes and their role in forensic investigations. Windows services are background processes crucial for system functionality, running independently of user interaction- making them ideal. Target were exploitation. Join me to explore the intricate details of Windows services and their signi…
  continue reading
 
Welcome back to OCA Community Connect, your source for all things related to the Open Cybersecurity Alliance. In today's episode, we have the pleasure of speaking with Vasilios Mavroeidis, a cybersecurity professor at the University of Oslo and a member of the OCA governing board. So, join us as Vasilios Mavroeidis shares his expertise and insights…
  continue reading
 
Guest: Kat Traxler, Security Researcher, TrustOnCloud Topics: What is your reaction to “in the cloud you are one IAM mistake away from a breach”? Do you like it or do you hate it? A lot of people say “in the cloud, you must do IAM ‘right’”. What do you think that means? What is the first or the main idea that comes to your mind when you hear it? Ho…
  continue reading
 
Dive deep into the latest episode of "The Weekly MoneyClip" featuring insights from five esteemed business experts: James Breslo, Jennifer Horn, Michael Lee, Simson Garfinkle, and Kenny Polcari. In this episode, James Breslo dissects the failure of Google's Gemini A.I. app and its potential parallels with BudLight's negative trajectory. Jennifer Ho…
  continue reading
 
This week, we're delving into the realm of fast flux, a cunning technique employed by attackers to cloak their true, malicious domains. Its effectiveness is the reason behind its widespread use, making it crucial for analysts to grasp its nuances and avoid chasing elusive ghosts during investigations. Stay tuned as I unravel the intricacies of fast…
  continue reading
 
Guest: Victoria Geronimo, Cloud Security Architect, Google Cloud Topics: You work with technical folks at the intersection of compliance, security, and cloud. So what do you do, and where do you find the biggest challenges in communicating across those boundaries? How does cloud make compliance easier? Does it ever make compliance harder? What is y…
  continue reading
 
Get ready for a jam-packed episode of "The Weekly Money Clip," where our expert contributors offer invaluable insights to prepare you for the week ahead. Join us as Simson Garfinkel, Michael Lee, Scott Stantis, Fred Bauer, and Jennifer Horn dissect the latest financial stories and trends shaping the market landscape. From Google's challenges with t…
  continue reading
 
Welcome to Episode 2 of "The Weekly Money Clip," where CenterClip's esteemed contributors provide invaluable insights into the latest financial trends and economic indicators. In this episode, join Scott Stantis, Michael Lee, Mitch Roschelle, Kenny Polcari, and Josh Hammer as they delve into pressing topics shaping the global economy. Kicking off t…
  continue reading
 
Join Wall Street trader and host Todd M. Schoenberger in an insightful conversation with Barbara Doran, the CEO and CIO of BD8 Capital Partners, as they dive deep into the current state of the stock market. Barbara shares her expert insights on market trends and offers valuable suggestions on how to strategically navigate the dynamic financial land…
  continue reading
 
Get ready for an unparalleled journey through the world of finance with the debut episode of "The Weekly MoneyClip," proudly brought to you by CenterClip and distributed by CrossCheck Media. In this groundbreaking podcast, we're ushering in a new era of business podcasting, promising insightful commentary and diverse perspectives on the latest fina…
  continue reading
 
Join Wall Street traders Todd M. Schoenberger and Tobin Smith in an enlightening episode of "Buy Hold Sell," as they welcome back Victoria Fernandez, CFA, Chief Market Strategist at Crossmark Global Investments. Victoria offers a cautionary perspective on the current market frenzy, urging investors to tread carefully amidst record highs. With the S…
  continue reading
 
Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and XEC Director are used by frontline officers versus lab analysts. The discussion cove…
  continue reading
 
In this week's exploration, I'm delving into the intricate realm of the Master File Table (MFT), a pivotal forensic artifact in Windows investigations. The MFT provides a valuable gateway to decode evidence across various scenarios. Join me in this episode as we unravel the forensic basics, explore diverse use cases, and discover a range of tools t…
  continue reading
 
Guest: Merritt Baer, Field CTO, Lacework, ex-AWS, ex-USG Topics: How can organizations ensure that their security posture is maintained or improved during a cloud migration? Is cloud migration a risk reduction move? What are some of the common security challenges that organizations face during a cloud migration? Are there different gotchas between …
  continue reading
 
Welcome back to another insightful episode of OCA Community Connect. Today, our host Roseann Guttierrez engages in a compelling conversation with Mark Mastrangeli, the cloud engagement director at Palo Alto Networks and co-chair of the OCA Project Governing Board (PGB). Mark shares his remarkable journey into the tech industry and the pivotal role …
  continue reading
 
Welcome to another fascinating episode of OCA Community Connect! In this installment, our host, Roseann Guttierrez, engages in an insightful conversation with Kenneth Peeples, a principal cybersecurity architect at Red Hat, to unravel the ins and outs of the cutting-edge Kestrel as a Service (KaaS) project. As Kenneth shares the nitty-gritty detail…
  continue reading
 
In this episode of OCA Community Connect, we delve into the world of Open XDR Architecture (OXA) with our guest, David Bizeul, the co-founder and chief scientific officer of Sequoia IO. David provides an in-depth look at OXA, its significance, and the impact it has on the cybersecurity community. He emphasizes the importance of preserving expert re…
  continue reading
 
In this episode of OCA Community Connect, we have the pleasure of welcoming Duncan Sparrell, chief cyber curmudgeon of sFractal Consulting LLC, and OASIS Board member. Duncan gives us a glimpse into the Cybersecurity Automation Sub-Project (CASP) and also shares information on the recent cybersecurity automation village event, providing highlights …
  continue reading
 
In this episode of OCA Community Connect, our host Roseann Guttierrez sits down with Xiaokui Shu, a senior research scientist from IBM and chair of the OCA technical steering committee, to delve into the world of cybersecurity and the Kestrel subproject. Xiaokui provides an insightful overview of Kestrel as a threat hunting language aimed at stream…
  continue reading
 
Jason Keirstead, a Distinguished Engineer with IBM and the CTO of Threat Management, discusses the importance of the Open Cybersecurity Alliance (OCA) in addressing the problem of interoperability in cybersecurity. He explains that the lack of common ways to integrate cybersecurity products has led to inefficiencies and high costs for vendors and c…
  continue reading
 
Loading …

Quick Reference Guide