show episodes
 
Artwork

1
Digital Forensics Now

Heather Charpentier & Alexis "Brigs" Brignoni

Unsubscribe
Unsubscribe
En gång i månaden
 
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
  continue reading
 
Artwork

1
Forensic Focus

Forensic Focus: Digital Forensics, Incident Response, DFIR

Unsubscribe
Unsubscribe
En gång i månaden+
 
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
  continue reading
 
Artwork

1
Digital Forensics Redefined

Defense Forensic

Unsubscribe
Unsubscribe
En gång i månaden
 
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
  continue reading
 
Artwork

1
CyberSpeak's Podcast

Bret Padres and Ovie Carroll

Unsubscribe
Unsubscribe
En gång i månaden
 
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
  continue reading
 
Artwork

1
Digital Detectives

Legal Talk Network

Unsubscribe
Unsubscribe
En gång i månaden
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
Artwork

1
OCA Community Connect

Roseann Guttierrez

Unsubscribe
Unsubscribe
Varje vecka
 
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
  continue reading
 
Artwork

1
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops

The Lead Tech Podcast | The Talk Show For Electronics Repair Shops

Unsubscribe
Unsubscribe
Dagligen+
 
Do you want to take your repair shop to the next level? Our owners helped grow some of the largest repair shops in the southeast including The Computer Warriors, Mr. Phix, Mobile Zone, and Smart Touch Repair Center. The Lead Tech Podcast aims to help you expand your offerings to data recovery, forensics, networking, board-level repair, and to deliver an unbelievable customer service experience. Become the largest repair shop in town and gain the competitive advantage.
  continue reading
 
Artwork

1
Data Discourse

Peter L. Mansmann, Esq.

Unsubscribe
Unsubscribe
Varje vecka
 
Welcome to Data Discourse, a podcast brought to you by the team at Precise Discovery. In this podcast, we take a look at practical strategies and insights regarding digital and mobile forensics, as well as eDiscovery. We break down the important aspects of this constantly evolving aspect of law, with each episode designed to elevate your knowledge and showcase why, since 2007, the experts at Precise Discovery have been the trusted partner to hundreds of law firms on thousands of matters. Be ...
  continue reading
 
Podcast in which students in Mr. Lange's Computer Science courses have a platform to discuss what they are currently learning in their classes, innovative development projects students are completing during their Research & Development opportunities, technology related topics that are in the news and new amazing technologies coming into the market.
  continue reading
 
Artwork

1
FBI Confidential

KSL Newsradio

Unsubscribe
Unsubscribe
En gång i månaden
 
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
  continue reading
 
Loading …
show series
 
Send us a text Could AI in forensic analysis be more of a liability than an asset? Join us as we explore this pressing concern. We kick off this episode with an important update for those dealing with Android extractions. Recent changes to the Android OS and Google Play Store might be causing the Keystore (secrets.json) file to either miss data or …
  continue reading
 
In 2024, AI has not only revolutionized how we defend against cyber threats but also how those threats are being carried out. We'll explore how AI is enabling faster, more efficient security incident responses, with real-world examples of its application in automated threat detection and response, advanced forensics, and more. But with every techno…
  continue reading
 
SQL injection poses significant risks by enabling attackers to access sensitive metadata, execute dynamic SQL commands, and alter system parameters. These actions can lead to unauthorized data access and system disruptions, especially if attackers gain elevated privileges. This week I'm talking about SQL attack patterns from a triage point of view …
  continue reading
 
Send us a text Join us as we discuss the latest blogs and training opportunities available to keep you at the forefront of digital forensics. We’ll then dive into the release of iOS 18 and its impact on digital forensic investigations. Beyond tools and gadgets, we'll explore the shift towards cloud-based evidence storage, weighing its benefits and …
  continue reading
 
I decided to talk this week about the Importance of Secure Coding Knowledge for Security Incident Response Investigations. Knowing secure coding principles helps identify the root causes of vulnerabilities and recognize attack patterns. It facilitates effective communication and collaboration with developers, ensuring accurate incident reports and …
  continue reading
 
Martino Jerian, CEO of Amped Software, joins the Forensic Focus Podcast to discuss AI’s impacts on video forensics. In this episode, Martino delves into the growing role of artificial intelligence in automating forensic processes, as well as the benefits and challenges it brings to the field. He shares insights on how AI is reshaping image and vide…
  continue reading
 
This week, we're covering zero-day vulnerability response from a Digital Forensics and Incident Response professional's perspective. In our roles, we often get involved in various tasks that require a security mindset, and one critical task is responding to zero-day vulnerabilities. To provide a real-world context, we'll integrate the recently disc…
  continue reading
 
Paul Gullon-Scott BSc MA MSc MSc FMBPSS joins the Forensic Focus Podcast to discuss the mental health challenges faced by digital forensic investigators (DFIs), particularly in relation to secondary traumatic stress (STS). He explains how exposure to distressing content, such as child sexual abuse material (CSAM), can lead to burnout, anxiety, and …
  continue reading
 
Welcome to this week’s session, where we’ll delve into web shell forensics—an ever-critical topic in incident response investigations and threat-hunting strategies. Today, I’ll provide a breakdown that includes the latest developments, detailed triage techniques, and practical examples of what to look for during your investigations:…
  continue reading
 
Send us a text Recognizing excellence is key in our community, and we spotlight the SANS Difference Maker Awards and Cellebrite Summit Digital Justice Awards. Discover why it’s crucial to nominate your peers and learn about the newly opened registration for IACIS 2025 training classes, featuring must-attend courses like Advanced Mobile Device Foren…
  continue reading
 
Rootkits are hard to detect because they employ advanced stealth techniques to hide their presence. They can conceal processes, files, and network activities by altering system calls and kernel data structures. The deep system knowledge and specialized tools required for low-level analysis make rootkit detection complex and resource-intensive. Limi…
  continue reading
 
Digital Forensics Redefined: Unveiling the Past with Rob Walensky and Billy Carpenter In this episode of Digital Forensics Redefined, host Rob Walensky is joined by Billy Carpenter, a distinguished figure in law enforcement with an impressive background in digital forensics. From his start as a Patrol Officer with the Village of Warrens Police Depa…
  continue reading
 
In the Season 1 finale of Data Discourse (Episode 5), our discussion centers on the transformative changes in e-discovery practices and technologies. Throughout this episode featuring Pete Mansmann and Bill Saccani, you’ll discover valuable insights into how these advancements are reshaping data management during litigation, offering practical advi…
  continue reading
 
In Episode 3 of Data Discourse, Pete Mansmann and Jeff Stiegler focus on the crucial role of digital evidence in contemporary legal disputes. The episode explores how forensic analysis of digital data can offer vital insights across various scenarios, from accidents to employment issues, by looking at real-world cases and experiences we’ve tackled …
  continue reading
 
In the debut episode of Data Discourse, Pete Mansmann and Jeff Stiegler dive deep into the world of mobile forensics, providing tangible insights on its growing importance in the legal field. Throughout this conversation, Pete and Jeff discuss how mobile forensic analysis is increasingly pivotal in legal cases ranging from accidents to employment d…
  continue reading
 
In Episode 2 of Data Discourse, Pete Mansmann and Jeff Stiegler break down changes, challenges, and evolutions in digital forensics - zeroing in on computers, social media, and the Internet of Things. They examine how advancements in technology are reshaping data collection and analysis methods. This episode provides valuable insights for how inves…
  continue reading
 
In Episode 4 of Data Discourse, Pete Mansmann and Bill Saccani focus on the essential process of e-discovery and its role in managing electronically stored information in legal cases. Throughout this episode, you’ll get a comprehensive look at the strategies and best practices needed for effective e-discovery - the need for careful data management …
  continue reading
 
Send us a text What's the real impact of AI on law enforcement documentation? Can digital forensics tools truly revolutionize our investigative processes? These are just some of the provocative questions we tackle in our season two premiere of Digital Forensics Now! Join us as we celebrate our one-year anniversary with reflections on the past year,…
  continue reading
 
Bash history's forensic value lies in its ability to answer diverse investigative questions, making it a cornerstone artifact for Linux systems. It aids in triaging lateral movement, identifying reconnaissance activities, and detecting attempts at establishing persistence. This underscores the importance of structuring triage tasks around specific …
  continue reading
 
In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.…
  continue reading
 
The UserAssist key is a Windows Registry artifact that logs details about user activity, such as recently accessed programs and files. It encodes information on the frequency and last access time of items launched via Windows Explorer. This helps investigators understand user behavior and timeline of actions on a system, providing evidence of progr…
  continue reading
 
Content warning - this episode discusses suicidal feelings. Prof. Sarah Morris joins the Forensic Focus Podcast to discuss the critical topic of mental health within the digital forensics field. The conversation covers the impact of traumatic content on analysts, the gaps in mental health support services, and the challenges faced by the industry d…
  continue reading
 
Every incident response outfit should have a set of guidelines for their team which outlines the standard actions or common considerations for security investigations. In this episode, I highlight some of the key points for security teams with a special focus on initial actions which typically set the tone for success during the subsequent investig…
  continue reading
 
Send us a text (THIS IS WHAT AN AI GENERATED DESCRIPTION WITH NO HUMAN CORRECTIONS WILL PROVIDE FOR YOU! SO NATURALLY WE HAD TO KEEP IT HAHA!) What happens when a digital forensics expert sets up a podcast studio in a cupboard under the stairs and a co-host becomes a modern-day Snow White with her Bird Buddy camera? You get a lively and engaging ep…
  continue reading
 
Welcome to Data Discourse! Check out our official trailer and discover what this podcast is all about. We've also included a few brief clips from Episodes 1 and 2 with Jeff Stiegler and Episode 5 with Bill Saccani. Be sure to subscribe and follow the podcast so you don't miss the world premiere of Data Discourse - Season 1 in the very near future! …
  continue reading
 
Understanding the different types of databases is important for security incident response investigations, as databases are often targeted by attackers seeking sensitive information. Each database type—relational, NoSQL, in-memory, and cloud-based—has unique structures, query languages, and security mechanisms. Familiarity with these variations ena…
  continue reading
 
CIS (Center for Internet Security) Benchmarks provide a comprehensive set of best practices for securing IT systems and data, which are vital for security response investigations. These benchmarks, developed through a consensus-driven process by cybersecurity experts, offer detailed guidelines for configuring operating systems, applications, and ne…
  continue reading
 
Loading …

Snabbguide