A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
We take the digital forensics news of today and forecast the future long term impact to our industry, both positive and negative.
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading

1
Episode 23:AI Voice Agent Security: Voice AI Under Siege: SIP Spoofing, Cost Drain, and How to Fight Back
33:29
33:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:29Send us a text In this episode of Traffic Light Protocol, we kick off our AI series with a hard look at how voice AI agents are being targeted; and how fast small businesses and startups can rack up serious bills overnight. Guest Myles Agnew returns to unpack how old-school telecom tricks are being repurposed in the age of SIP/VoIP and AI: caller I…
…
continue reading
Send us a text We celebrate our two-year podcast anniversary and discuss the importance of thorough case preparation for CSAM cases, courtroom experience, and extracting evidence from iOS devices. • SANS Difference Maker Awards open for nominations through September 15th across multiple categories • AI debate webinar with Magnet Forensics scheduled…
…
continue reading

1
From Cryptic Apps to Clickable Maps: Making Sense of Digital Evidence
1:16:20
1:16:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:16:20Send us a text We're back! After a short break we are back to discuss the growing crossover between real-world events and digital evidence in court cases, highlighting how device data can make or break timelines in high-stakes investigations. This episode covers: Ian Whiffin’s latest forensic work, including iOS power log timestamps, Apple Health d…
…
continue reading

1
Techno, Timeline, and Training Truths
1:06:03
1:06:03
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:06:03Send us a text We kick off this episode with highlights from the Techno Security Conference, our 80s-themed outfits, packed LEAPP labs, AI panel discussions, and great conversations with friends and colleagues across the field. We discuss Brett Shavers’ recent series on DFIR entry-level work, and share our thoughts on the need for better forensic t…
…
continue reading

1
Episode 22:AI Chat Forensics: How to Find, Investigate, and Analyse Evidence from ChatGPT, Claude & Gemini
40:52
40:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
40:52Send us a text Unlock the secrets behind digital forensic investigations into AI chat platforms like ChatGPT, Claude, and Google's Gemini in this insightful episode. Learn the precise methods for discovering, extracting, and interpreting digital evidence across Windows, Mac, and Linux environments, whether it's browser caches, memory forensics, net…
…
continue reading

1
Episode 21: How IRCO is Changing DFIR: The AI Copilot for Real-Time Cyber Investigations
15:48
15:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:48Send us a text Link to IRCO- Incident Response Copilot on Chat GPT https://chatgpt.com/g/g-68033ce1b26481919b26df0737241bac-irco-incident-response-co-pilot In this episode of TLP: The Digital Forensics Podcast, Clint dives deep into IRCO (a custom GPT designed specifically for DFIR and SOC analysts). From real-world cyber incidents to post-incident…
…
continue reading

1
Episode 20:What Makes an Elite Incident Response Team: Mindset, Mastery, and Real-World DFIR Lessons
38:14
38:14
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
38:14Send us a text Drawing inspiration from observing military special forces and over five years of hands-on DFIR experience, Clint explores the mindset, habits, and tactical processes that set top-performing IR teams apart. Clint Marsden explores the mindset, habits, and tactical processes that set top-performing IR teams apart. From threat intellige…
…
continue reading

1
Episode 19: AI Data Poisoning: How Bad Actors Corrupt Machine Learning Systems for Under $60
26:20
26:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:20Send us a text Clint Marsden breaks down a critical cybersecurity report from intelligence agencies including the CSA, NSA, and FBI about the growing threat of AI data poisoning. Learn how malicious actors can hijack AI systems for as little as $60, turning machine learning models against their intended purpose by corrupting training data. Clint ex…
…
continue reading

1
Every Breath You Take, Every Swipe You Make—Your iPhone’s Logging It
1:15:09
1:15:09
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:15:09Send us a text Apple devices are constantly recording user activity, yet few forensic examiners are making use of the vast amount of data these systems quietly generate. Apple's Unified Logs and Spotlight databases track nearly everything that happens on an iOS device, often without the user realizing it. Would you believe an iPhone can generate ar…
…
continue reading

1
Stomping Grounds: Digital Forensics at IACIS 2025
32:40
32:40
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:40Send us a text The Digital Forensics Now podcast brings together the core LEAPPs developer team for a candid, unscripted conversation about mobile forensics, legal challenges, and the future of their tools during the IACIS conference in Orlando. • First time bringing together most of the LEAPPs development team in person • Florida's new requirement…
…
continue reading

1
The "Bear" Essentials of Digital Forensics 🐻
1:13:55
1:13:55
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:13:55Send us a text The digital forensics world isn’t slowing down — and neither are we. In this episode, we celebrate Heather’s well-deserved recognition as Cellebrite’s Mentor of the Year 2025. Naturally, there were a few speech mishaps and, somehow, a bear raiding Heather’s bird feeder (yes, actual wildlife). But between the chaos, we get serious abo…
…
continue reading

1
The Iceberg of Digital Evidence: What AI Can't See
1:06:51
1:06:51
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:06:51Send us a text The boundary between tool-dependent analysis and true forensic expertise grows increasingly blurred as AI enters the digital forensics landscape. Alexis Brignoni and Heather Charpentier reunite after a month-long hiatus to sound the alarm on a concerning trend: the integration of generative AI into forensic tools without adequate saf…
…
continue reading

1
Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps
43:16
43:16
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
43:16Send us a text This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response. If you’re in security operations, digital forensics, or incident response, this episode wi…
…
continue reading
Send us a text So You Want to Build Your Own DFIR CTF? Ever wanted to build your own Digital Forensics and Incident Response (DFIR) Capture the Flag (CTF) challenge but weren’t sure where to start? In this episode of Traffic Light Protocol, we share the how-to of CTF builders, making it easy for anyone—no pentesting skills required! Today's episode…
…
continue reading

1
Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations
30:43
30:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:43Send us a text Kicking off 2025, we're getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity. In this episode, we cover how to…
…
continue reading

1
Mind Matters: Navigating DFIR with Balance
1:03:25
1:03:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:03:25Send us a text Get ready for a hands-on look at digital forensics and the challenges professionals tackle every day. We share a story about forensic guessing that highlights the importance of testing assumptions and following the evidence to avoid errors. The discussion emphasizes how staying grounded in facts can prevent investigations from going …
…
continue reading

1
New Year, New Discoveries: Diving into Digital Forensics!
1:16:29
1:16:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:16:29Send us a text Kick off your new year with some forensic fun as we recount our holiday escapades and dive into the latest in digital forensics! Ever wondered how RAM dumps from Android devices can reveal crucial data? We spotlight MSAB's innovative RAMalyzer tool and their new blog series covering RAM from mobile devices. Discover how the digital f…
…
continue reading

1
The Gift of Expertise: Why Forensics Matter in the Courtroom
1:19:31
1:19:31
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:19:31Send us a text Join us for a holiday-themed episode of Digital Forensics Now, where we blend expert insights with personal stories from the field of digital forensics. This episode delves into cutting-edge tools and techniques for digital forensics. Explore insights from Arsenal on advanced methods for analyzing swap space and memory files. We also…
…
continue reading

1
S4: E5 Ediscovery Day—Career Advice from DFIR and ED Veterans
53:33
53:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
53:33Join us for the “Heroes Unite: Exploring the Future of Legal Technology Careers” panel at the 3rd Annual ACEDS eDiscovery Day in Austin, Texas. This dynamic session brings together industry leaders to discuss the rapidly evolving legal technology landscape. Gain insights into how emerging technologies are reshaping career paths, the growing importa…
…
continue reading

1
BFU Data, Forensic Tools, and the Future of Digital Investigations
1:17:52
1:17:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:17:52Send us a text The latest episode of Digital Forensics Now kicks off with lighthearted banter about Heather's newfound fame in commercials, bringing a fun and relatable start to a tech-heavy discussion. Following the laughs, the conversation shifts to an invigorating recap of Alexis' recent experience at SANS DFIRCON, featuring interactions with di…
…
continue reading

1
iOS 18’s Inactivity Reboots Explained: AFU to BFU Transitions with Chris Vance from Magnet Forensics
1:02:32
1:02:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:02:32Send us a text Join us on the Digital Forensics Now podcast as we explore the details of the iOS 18 inactivity reboot issue with mobile forensics expert Christopher Vance from Magnet Forensics. Chris traces the origins of this challenge back to iOS 17 and explains how unified logs play a key role in diagnosing these system memory resets. This episo…
…
continue reading

1
AI in Court: Testimony or Tech-tastrophe?
1:14:36
1:14:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:14:36Send us a text Could AI in forensic analysis be more of a liability than an asset? Join us as we explore this pressing concern. We kick off this episode with an important update for those dealing with Android extractions. Recent changes to the Android OS and Google Play Store might be causing the Keystore (secrets.json) file to either miss data or …
…
continue reading

1
Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool
23:20
23:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:20Send us a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments. Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Activ…
…
continue reading

1
Awareness Unlocks Discovery: Knowing It Exists is the First Step to Finding It
1:05:28
1:05:28
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:05:28Send us a text Join us as we discuss the latest blogs and training opportunities available to keep you at the forefront of digital forensics. We’ll then dive into the release of iOS 18 and its impact on digital forensic investigations. Beyond tools and gadgets, we'll explore the shift towards cloud-based evidence storage, weighing its benefits and …
…
continue reading

1
Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson
1:08:33
1:08:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:08:33Send us a text In this episode of Traffic Light Protocol, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University. Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital…
…
continue reading

1
Balancing Act: Trials, Training, and the Future of Digital Forensics
1:06:33
1:06:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:06:33Send us a text Recognizing excellence is key in our community, and we spotlight the SANS Difference Maker Awards and Cellebrite Summit Digital Justice Awards. Discover why it’s crucial to nominate your peers and learn about the newly opened registration for IACIS 2025 training classes, featuring must-attend courses like Advanced Mobile Device Foren…
…
continue reading

1
Digital Forensics, Redefined: Episode 13 - Billy Carpenter and "Bucky"
17:57
17:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:57Digital Forensics Redefined: Unveiling the Past with Rob Walensky and Billy Carpenter In this episode of Digital Forensics Redefined, host Rob Walensky is joined by Billy Carpenter, a distinguished figure in law enforcement with an impressive background in digital forensics. From his start as a Patrol Officer with the Village of Warrens Police Depa…
…
continue reading

1
AI as a Report Writing Tool: Accuracy Enhancing or Recollection Poisoning?
1:07:06
1:07:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:07:06Send us a text What's the real impact of AI on law enforcement documentation? Can digital forensics tools truly revolutionize our investigative processes? These are just some of the provocative questions we tackle in our season two premiere of Digital Forensics Now! Join us as we celebrate our one-year anniversary with reflections on the past year,…
…
continue reading

1
Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation & Forensics in the cloud, with Jacob Wilson
54:55
54:55
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
54:55Send us a text Episode 13 is another giant episode with a focus on what its like be in the mud working on real life forensic investigations. Jacob and Clint talk about ELK EDR, using Sysmon. Sandbox Environments: Jacob discusses the creation of a sandbox environment using an ELK stack combined with Sysmon, enabling in-depth malware analysis by capt…
…
continue reading

1
Episode 12 - You're forced to decide: Cyber Generalist or Cyber Specialist?
17:47
17:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:47Send us a text Quotes: “In the fast-paced world of DFIR, you are a mission critical system. Your job isn’t just to uncover what happened during an incident, but to do so in a way that gets results fast.” “Specialists bring expertise that pushes the entire industry forward, while generalists offer versatility and adaptability in the ever-changing la…
…
continue reading

1
Bird Cameras and Forensic Insights from New Zealand
1:13:37
1:13:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:13:37Send us a text (THIS IS WHAT AN AI GENERATED DESCRIPTION WITH NO HUMAN CORRECTIONS WILL PROVIDE FOR YOU! SO NATURALLY WE HAD TO KEEP IT HAHA!) What happens when a digital forensics expert sets up a podcast studio in a cupboard under the stairs and a co-host becomes a modern-day Snow White with her Bird Buddy camera? You get a lively and engaging ep…
…
continue reading

1
Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew
52:46
52:46
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
52:46Send us a text In this episode of Traffic Light Protocol, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when de…
…
continue reading

1
Episode 10 - Detecting and Preventing Phishing Attacks
19:04
19:04
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
19:04Send us a text Quotes: "Phishing targets the human element, the 'wetware,' often the weakest link in any security chain." - Clint Marsden "Phishing isn't just about poorly spelled emails anymore; it's about sophisticated campaigns that even cyber-aware individuals can fall victim to." - Clint Marsden "Effective defense against phishing involves not…
…
continue reading

1
Due Diligence, Password Cracking & New Tool Features
1:23:26
1:23:26
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:23:26Send us a text Welcome back to another episode of the Digital Forensics Now podcast! In this episode, we explore the critical need for continuous learning in the field, discuss fascinating forensic tools, showcase UFADE with its new chat capture feature, and engage in a spirited debate on the value of certifications. Get ready to expand your knowle…
…
continue reading

1
Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies
21:48
21:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
21:48Send us a text Episode Title: "Unmasking APT40: Tactics, Challenges, and Defense Strategies" Key Takeaways: APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009. They target various sectors including academia, aerospace, defense, healthcare, and maritime industries. APT40 uses advanced tactics such as spear phish…
…
continue reading

1
Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and printer forensics ...
19:57
19:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
19:57Send us a text In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget. Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. Event log cleared: Event ID 1102 ACSC Sysmon: https://git…
…
continue reading

1
Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures
17:07
17:07
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:07Send us a text In todays episode of TLP - Traffic Light Protocol, Clint Marsden talks about Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures. Key Takeaways Understanding Scattered Spider: Scattered Spider, also known as Roasted Octopus or Octo Tempest, utilizes various legitimate tools for malicious purpos…
…
continue reading

1
Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo
26:11
26:11
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:11Send us a text In this episode, we speak with Phil Ngo, a Primary Investigator in Accenture's global cyber response team. As a primary investigator, he is responsible for helping clients recover from major incidents as well as delivering proactive cyber services, such as threat hunting and tabletop exercises. Philip started his career as a high sch…
…
continue reading

1
Microsoft recall of Recall & all of the latest Digital Forensic News!
1:07:30
1:07:30
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:07:30Send us a text Join us as we recount our recent travels to Argentina and the Techno Security & Digital Forensics conference. We'll share the highlights of our trips before diving into the core content. What could possibly go wrong with a feature designed for user convenience? We'll scrutinize Microsoft's controversial "Recall" feature, exploring it…
…
continue reading

1
Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity)
33:06
33:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:06Send us a text This is the biggest episode from a content perspective so far. I'm excited to share it with you. Episode Highlights: How to run post-incident debriefs and post-mortems. Involving external teams Using lessons learned to form actionable insights. Key questions to address in incident analysis. Effective report writing strategies, includ…
…
continue reading

1
Episode 4 - NIST SP 800-61 Computer Security Incident Handling Guide (Containment,Eradication and Recovery)
22:10
22:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
22:10Send us a text Show Notes: Episode on Containment, Eradication, and Recovery In this episode of Traffic Light Protocol, Clint Marsden explores the containment, eradication, and recovery phases of the NIST SP 800-61 framework for computer security incident handling. Key Topics Covered: Containment Strategies: Choosing appropriate containment methods…
…
continue reading

1
Episode 3 - (Part 2) NIST SP 800-61 Computer Security Incident Handling Guide (Detection)
11:41
11:41
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
11:41Send us a text In this conclusion of the Detection phase, Clint wraps up Incident Prioritisation. This includes Functional impacts of the incident, information impact of the incident and the recoverability of the incident. Not all of these are needed, or relevant when tracking your incident and Clint explains when to categorise incidents using thes…
…
continue reading

1
Episode 3 - NIST SP 800-61 Computer Security Incident Handling Guide (Detection)
46:52
46:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
46:52Send us a text In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61. Attack vectors for digital security incidents, including insider threats and weaponized USBs. Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation The importance of following temporal…
…
continue reading

1
Episode 2 - NIST SP 800-61 Computer Security Incident Handling Guide (Preparation)
27:17
27:17
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
27:17Send us a text In this Episode Clint Marsden talks about the first phase of Computer Security Incident Handling according to NIST. Listen to real world examples of how to get prepared before a Cyber Security Incident arrives. Show notes: Link to NIST SP 800-61 PDF https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf Bro has be…
…
continue reading

1
Android Security, Market Acquisitions, Research, Tools & More Tools!
1:23:13
1:23:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:23:13Send us a text Join us for an engaging session where we'll recap recent events and activities before diving into the latest research, cutting-edge tools, and exciting updates! Tune in as we explore groundbreaking research conducted by emerging stars in the DFIR community. We'll delve into the testing of data stored in iOS Unified Logs, focusing on …
…
continue reading

1
Episode 1 - Digital forensics trends and preparations, learning from real life case studies & DFIR training for getting started
23:27
23:27
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:27Send us a text In this first episode we kick off with Clint Marsden, the host of Traffic Light Protocol (TLP) where he talks about what its like to work in DFIR, how to get started with Cyber training, what to expect in future episodes, and of course a light touch on AI Forensics! Join us for the first episode. The next episodes coming up talk abou…
…
continue reading

1
Live from IACIS with the Phone Wizard, Bill Aycock!
57:55
57:55
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
57:55Send us a text Live from the International Association of Computer Investigative Specialists (IACIS) with special guest Bill "the phone wizard" Aycock!! Notes: Three New SANS Posters https://www.sans.org/posters/ios-third-party-apps-forensics-reference-guide-poster/ https://www.sans.org/posters/android-third-party-apps-forensics/https://www.sans.or…
…
continue reading

1
From Disaster to Attainment: Crafting Digital Forensic Reports
1:24:41
1:24:41
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:24:41Send us a text Navigating the complexities of digital forensics can be daunting, but this week we've got your back with the exploration of Magnet Forensics' Axiom version 8, and its transformative Mobile View feature. As your hosts we're not just sharing tech updates; we're discussing the impact these tools have on our work and how they shape the n…
…
continue reading

1
Apple Is At It Again, Changing Our Logicals!
1:26:37
1:26:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:26:37Send us a text In mobile forensics, with each update brings new challenges and opportunities. Join us as we dissect the latest iOS 17.4 impacts, including the nuances of SQLite databases and the advent of write-ahead logs in Advanced Logical extractions. Our episode is brimming with insights that could change the way you approach data extraction an…
…
continue reading

1
Is Support on Life Support?
1:06:49
1:06:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:06:49Send us a text Unlock the secrets of advanced forensic analysis with us! We reveal essential training classes that every digital sleuth needs to stay ahead in an ever-changing tech landscape. Sign-on to be enlightened by experts in the captivating world of data structures through Hexordia's class and IACIS's comprehensive course. But it's not all a…
…
continue reading