Best computer forensics podcasts we could find (Updated December 2018)
Related podcasts: Security Technology Tech Computer Information Business Education Distance Communications Cyber Forensics Crime Software News Science Podcasting Careers US Government Higher Education Society  
Computer forensics public [search 0]
×
Join millions of Player FM users today to get Computer forensics news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
T
Talk Forensics
Weekly
 
Forensics science discussion in all disciplines. With experts in the various fields of forensics taking calls from listeners
 
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
 
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
 
T
The CyberJungle
Monthly
 
The CyberJungle is the nation's first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fast-paced and includes hard hitting news analysis. Formerly The Data Security Podcast.
 
H
Hacker Daily
Daily+
 
This is a Podcast syncs with Hacker News (https://news.ycombinator.com) automatically
 
G
Go Law Enforcement
Monthly
 
Inside career tips from Police Officers working in specialties such as Crime Scene Investigation, K-9, and Homicide Investigation. Learn how you can have a great career in law enforcement.
 
News and Interviews from the Observer-Dispatch Utica, NY
 
Discussion of the life and business of being a private investigator
 
B
BTOW
Monthly
 
If you are running a business in Australia then this is for you. 60% of Australian businesses fail in the first 3 years and this podcast wants to help you beat the odds.
 
A women in tech podcast featuring technical interviews with prominent women in technology. The interviews explore topics in software engineering, software design, artificial intelligence, research, entrepreneurship, career strategy, machine learning, security, and more.Hosted by Edaena Salinas, Software Engineer at Microsoft.
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, encapsulation, data structures, databases, memory management, software development, virtualization, and websites. Languages include C, PHP, and JavaScript plus SQL, CSS, and XHTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. De ...
 
Ever feel like it's getting tougher to find any semblance of the real world coming from the media? You're not alone. While most people are not yet fully aware of the extent to which computer-generated fake environments and synthetic humans are used by dominant media in the largest world news stories, we are. CluesForum is a "media-safe" space where you are not pressured to believe in the creepy, technically imperfect computer-generated news imagery. Instead, we plant our feet firmly in the E ...
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
Perspectives on Technology and Education from Gordon F. Snyder, Jr. & Mike Qaissaunee
 
Welcome to the wonderful world of digital and computer forensics. In each episode Lee will have guests on the show to discuss the latest news in the field, tell stories from the real world, and much more.
 
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
Commentary, reviews, and tips relevant to anyone responsible for information security. Additional episodes are available at AdventuresinSecurity.com
 
Perspectives on Technology and Education from Gordon F. Snyder, Jr. & Mike Qaissaunee
 
T
The Audio Podcast
Monthly
 
A weekly podcast about audio technology, computer music and technique.
 
E
Excelsior Life
Monthly+
 
Excelsior Life: Distance EDU on Demand is an academic podcast series exploring a variety of education, business, and technology topics. Individual shows include ‘Excelsior LIVE,’ an interview series, and ‘Today in Cybersecurity,’ a daily podcast show airing each October during National Cybersecurity Month.
 
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
 
T
The ESI Report
Rare
 
The ESI Report with Michele Lange from Kroll Ontrack has the latest information about e-discovery technologies to help lawyers manage electronic evidence accurately and cost effectively in a fast changing legal world.
 
A
Armed with Science
Weekly
 
Armed with Science: Research and Applications for the Modern Military is a weekly webcast that discusses the importance of science and technology to military operations and the Department of Defense. We interview scientists, administrators, and operators to inform our listeners about cutting-edge scientific research and development sponsored by various defense offices. Tweet questions to @ArmedwScience and get SCIENCED!
 
C
CS50 2014
Weekly
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web development. Languages include C, PHP, and JavaScript plus SQL, CSS, and HTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. ...
 
S
Security Radio
Weekly
 
Welcome to Security Radio.
 
Learn how iPhone is used in small and medium-sized businesses. Brought to you by the Apple iPhone in business team.
 
Loading …
show series
 
This week I break down webshells for threat hunting and incident response triage.
 
This week I break down webshells for threat hunting and incident response triage.
 
Getting work experience while studying in school has become more accessible, especially in the software industry. Safia Abdalla, Open Source Maintainer on the nteract project talked about her experience as an independent consultant while she was in college. We also talked about Safia’s contributions to open source software since she was a first ...…
 
Our guest today is Dr. Erfan Ibrahim discussing his Comprehensive Tutorial on Data and Cyber Security. Dr. Ibrahim’s approach to cyber security is from a very different and methodical viewpoint. He discusses how there is a need to look at cyber security logically and that it is not much different from physical security. You will want to hear as ...…
 
This week I talk about contacting Mimikatz through windows event log.
 
This week I talk about contacting Mimikatz through windows event log.
 
Taking an idea into a product involves steps like evaluation, prototyping and commercialization. Maggie Ng, Vice President at Xinova explained the process of developing products. We talked about projects from different industries and the role of intellectual property. Maggie also talked about project trends from around the world.…
 
Our guest today is Travis Barlow who is the VP of Global Advance Security Services at GoSecure. He is the founder of the Atlantic Security Conference (AtlSecCon) located in Halifax, Nova Scotia, Canada that was started in 2011 with 75 people in a single room and has grown to 700+ attendees this year. He is considered a Canadian pioneer in cyber ...…
 
This week I talk about PDF analysis tools to check for malicious indictors in PDFs.
 
This week I talk about PDF analysis tools to check for malicious indictors in PDFs.
 
Product Marketing in technology varies depending on the product and the audience. In some cases it involves deep technical knowledge and understanding how developers work. Karri Alexion-Tiernan, VP of Product Marketing at Skytap, explained what product marketing consists of. We talked about effective ways of engaging with enterprise customers a ...…
 
Our guest John Bradshaw is a seasoned security professional, He emphasizes the importance of information assurance to win against cyber warfare. John explains the bits and bytes of how adversaries work in cybersecurity and what forensic tools and security techniques are needed to fight against them. He discusses the blind spots in the virtual w ...…
 
In this Hyatt recorded edition of the Exploring Information Security podcast, Micah Hoffman, Josh Huff, and Justin Nordine. Micah (@WebBreacher), Josh (@baywolf88), and Justin (@jnordine) join me to go over a variety of topics at DerbyCon 2018. The Hyatt was kind enough to provide space near the bar (shout to the amazing Lauren). In this episod ...…
 
Michael Arcuri of the Ward Arcuri Law Firm on West Park Row talks about the annual Clinton Shoppers' Stroll and Holiday Parade.
 
This week I talk about OWASP and why you should be paying attention.
 
This week I talk about OWASP and why you should be paying attention.
 
The way we develop software is constantly changing. Throughout the decades we see different processes and practices emerge in how we write software. Laura Butler, Vice President and Technical Fellow at Microsoft talked about her time working on Windows 95 and what it was like to write software in the 90s. We talked about debugging, performance, ...…
 
Today’s special Colorado Update is timely to the late economic growth we are experiencing nationwide. Our guests Chairman of the local Colorado Springs Economic Development Chamber (EDC) Dirk Draper, and director for Cybersecurity for the EDC Vinnie Persichetti, extend some exciting offers to the cyber community at large. Colorado Springs is th ...…
 
In this Hyatt recorded edition of the Exploring Information Security podcast, Micah Hoffman, Josh Huff, and Justin Nordine join me at DerbyCon 2018. Micah (@WebBreacher), Josh (@baywolf88), and Justin (@jnordine) join me to go over a variety of topics at DerbyCon 2018. The Hyatt was kind enough to provide space near the bar (shout to the amazin ...…
 
Mark Heinrich, Cyber Journalist, and an influencer of ISC2 and IEEE is our guest today. Mark shares his knowledge and experience as a professor and expert called upon to review CISSP domains. He is a great resource for cyber newcomers and he provides many of his tricks to excel in cyber industry in today’s show. He discusses the skills to reson ...…
 
Developer relations is a core component of platforms that allow developers to publish applications or games. Grace Francisco, VP of Developer Relations at Roblox, explained what developer relations is and different ways of interacting with creators. Roblox is the world's largest social platform for play. We talked about how to gather feedback f ...…
 
Gary Schacher, Department Commander for the New York American Legion, summarizes the issues with the decline in Legion membership.
 
In this whiskey fueled edition of the Exploring Information Security podcast, Ryan MacDougall and Colin Hadnagy of Social Engineer join me to discuss advanced OSINT. This past DerbyCon, I had the opportunity to take the Advanced OSINT with Ryan (@joemontmania) and Colin (@UnmaskedSE). The course was great! It was different from some of the othe ...…
 
This week I breakdown CRON for the uninitiated.
 
This week I breakdown CRON for the uninitiated.
 
In today’s show, host of the New Cyber Frontier Chris Gorog and hosts of Colorado=Security Alex Wood and Robb Reck share their thoughts, experiences, knowledge, and the focus of their shows in relation to cybersecurity efforts in Colorado Springs. Today's Joint show between the two Podcast cast showcase the strength of Cybersecurity in the Stat ...…
 
Small electronic components enable us to have powerful portable devices. Isabel Yang, Chief Technology Officer at Advanced Energy Industries explained what microelectronics is. Isabel has over 20 years of industry experience in semiconductor research. We talked about what transistors are, their characteristics and their role in electronics. Pri ...…
 
Jake Mihevc, associate dean of the Department of Business, Cybersecurity, & Computer Sciences at Mohawk Valley Community College, thanks the sponsors of the 10th CNY Hackathon at MVCC.
 
Oct 31, 2018: * SANS Netword Security: EXCLUSIVE-Tim Medin, Founder of Red Siege* PFIC2018: EXCLUSIVE-Joe McManus, CISO Automox* 0day: Embedded vids in MSFTOffice docs can hide malware* Deloitte: CEO and Board Risk Management Survey* DarkWeb: Laptop-Carrying Fed Infects Gov Network. See Show Notes/Links for Episode 405 at http://www.thecyberjun ...…
 
In this authenticated edition of the Exploring Information Security podcast, I talk about when passwords will finally die! This is a solo episode. I had the idea after sitting in a vendor pitch today (and because I’m slacking on my editing) where one of the sales guy mentioned that passwords WILL die. I disagree. I think passwords have been aro ...…
 
This week I talk about investigation strategies for logon events.
 
This week I talk about investigation strategies for logon events.
 
Today, our guest Charles White articulates his view on how encryption can be a solution for the cyber industries challenges. He discusses new thought processes in using encryption to create cyber controls and how this new technology can shrink the attack surface to reduce advanced persistent cyber threats. As he sees it, these are powerful weap ...…
 
Advancements in the cloud computing space have democratized how software developers manage their product infrastructure. With this, they can focus more on the core components of their product instead. Risha Mars, Software Engineer at Buoyant and Eliza Weisman, Systems Software Engineer at Buoyant explained various components that improve how an ...…
 
Karen and Doug have been running Splash's Swimming School for 30 years and now serve 2,200 customers. Topics of note include how they acquired their customers, setting their prices, legal issues and more!
 
Oneida County District Attorney Scott McNamara explains the function of Integrated Domestic Violence Court, one of several specialty courts now operating in the county.
 
This week I talk about PCAP hunting strategies.
 
This week I talk about PCAP hunting strategies.
 
Our guest Dr. Andy Heo, the Information sharing architect at National Cyber Exchange ISAO discusses the connection between human biology and computer operations. Dr. Heo has an interesting background for a cyber security industry practitioner as he began his educational career studying biology. Thought Biology may seem disconnected from Cyberse ...…
 
Learning to code opens a lot of opportunities. Even if you decide that you don’t want to code for a living, it helps you understand how software is made and the technical implications of it across different industries. Alex Sejdinaj, Founder of South Bend Code School, explained why she decided to start teaching kids how to code. We talked about ...…
 
Jessica has six years of running a business. Jess talks about what she wished she knew when she first started
 
Stu (@cybersecstu) is a Co-Founder of The Many Hats Club, which is a massive Discord community and podcast. Earlier this year, Stu started sharing Unusual Journeys. I love this series because it highlights that there is no true path into infosec. He’s had 18 series so far and each story is fascinating. In this episode we discuss: Why failure is ...…
 
This week I interview Craig Rowland of Sandfly Security about crypto-mining attacks on Linux systems. Learn more about Sandfly at https://www.sandflysecurity.com
 
This week I interview Craig Rowland of Sandfly Security about crypto-mining attacks on Linux systems. Learn more about Sandfly at https://www.sandflysecurity.com
 
Technology can be used to improve slow and manual processes. Ritu Vincent, Engineering Manager at Checkr, explained the bottlenecks of the background checks process and how it’s being improved. Ritu explained how a REST API and machine learning are speeding up the process of getting a background check, and reducing the unconscious bias that is ...…
 
CyberPatriot coach of the year, our guest Maj Bill Blatchley has coached his local Cadet Squadrons’ teams to eight straight appearances in the final round of this national competition. Mr. Blatchley Talks about national efforts that are getting kids involved with cyber security, and how you can connect with your children with CyberPatriot. Some ...…
 
Google login Twitter login Classic login