Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 111: Indicators of Compromise (IoCs) – Detection Foundations

13:58
 
Share
 

Manage episode 494503756 series 3677570
Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Detecting an attack starts with recognizing the signs. In this episode, we explore Indicators of Compromise (IoCs)—artifacts that suggest an organization may have been breached or is under active threat. You’ll learn how IoCs include file hashes, domain names, IP addresses, registry keys, and behavioral anomalies, and how analysts discover them during investigations or receive them through threat intelligence feeds.

We’ll also discuss how IoCs are categorized, how they are validated, and how they’re fed into SIEMs, firewalls, and endpoint detection platforms to prevent future occurrences. Understanding IoCs is not just about knowing what to block—it’s about knowing what to look for, how to trace a threat’s origin, and how to build alerts that actually matter. This episode arms you with foundational knowledge that ties directly into multiple CySA+ domains and daily SOC operations. Brought to you by BareMetalCyber.com

  continue reading

130 episodes

Artwork
iconShare
 
Manage episode 494503756 series 3677570
Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Detecting an attack starts with recognizing the signs. In this episode, we explore Indicators of Compromise (IoCs)—artifacts that suggest an organization may have been breached or is under active threat. You’ll learn how IoCs include file hashes, domain names, IP addresses, registry keys, and behavioral anomalies, and how analysts discover them during investigations or receive them through threat intelligence feeds.

We’ll also discuss how IoCs are categorized, how they are validated, and how they’re fed into SIEMs, firewalls, and endpoint detection platforms to prevent future occurrences. Understanding IoCs is not just about knowing what to block—it’s about knowing what to look for, how to trace a threat’s origin, and how to build alerts that actually matter. This episode arms you with foundational knowledge that ties directly into multiple CySA+ domains and daily SOC operations. Brought to you by BareMetalCyber.com

  continue reading

130 episodes

Tous les épisodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play