Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Computer Forensics Podcasts
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
My Hard Drive Died - Podnutz
…
continue reading
Welcome Savage scholars . We have talks about music, philosophy, psychedelics, computer science, BJJ, psychology , working out and more!!!! Aka beastly savage talk for scholars
…
continue reading
Your exploration inside Lawrence Livermore National Laboratory. Hear untold stories, meet boundary-pushing pioneers and get unparalleled access to groundbreaking science and technology. From national security challenges to computing revolutions, discover the innovations that are shaping tomorrow, today.
…
continue reading
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Welcome to Data Discourse, a podcast brought to you by the team at Precise Discovery. In this podcast, we take a look at practical strategies and insights regarding digital and mobile forensics, as well as eDiscovery. We break down the important aspects of this constantly evolving aspect of law, with each episode designed to elevate your knowledge and showcase why, since 2007, the experts at Precise Discovery have been the trusted partner to hundreds of law firms on thousands of matters. Be ...
…
continue reading

1
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops
Do you want to take your repair shop to the next level? Our owners helped grow some of the largest repair shops in the southeast including The Computer Warriors, Mr. Phix, Mobile Zone, and Smart Touch Repair Center. The Lead Tech Podcast aims to help you expand your offerings to data recovery, forensics, networking, board-level repair, and to deliver an unbelievable customer service experience. Become the largest repair shop in town and gain the competitive advantage.
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
From addressing societal challenges to advancing our understanding of the world around us, research matters to all of us. Listen to Research Matters, a production of the Office of Research at Kennesaw State University, to hear how our innovative researchers are working to solve these issues.
…
continue reading
We Cover the Cyberspace.
…
continue reading
"The Edge AIsle" brings you to the forefront of artificial intelligence and edge computing, powered by Hailo.ai. In this podcast, we explore how edge AI is reshaping industries from smart cities and intelligent video analytics to autonomous vehicles and retail innovation. Join industry experts and thought leaders as they share insights into how Hailo’s AI processors are transforming the way industries function, enabling real-time deep learning and AI-driven applications directly on edge devi ...
…
continue reading
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
…
continue reading
…
continue reading

1
Ric Prado: CIA Black Ops Operator That Hunted Bin Laden
1:13:33
1:13:33
Play later
Play later
Lists
Like
Liked
1:13:33Send us a text Ric Prado shares his remarkable journey from Cuban refugee to CIA Senior Operations Officer, revealing how being separated from his parents at age 8 during Castro's revolution eventually led him to America where he found purpose in military service and intelligence work. • Escaped Cuba at age 8 through Operation Peter Pan, sent alone…
…
continue reading
…
continue reading

1
F is for Footprints – Tracing User Activity Across Systems
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43In this episode, we uncover how digital footprints—from browser history and shell commands to registry hives and DNS logs—reveal a user’s activity even when they think it’s been erased. Real cases, practical tools, and expert tips for tracing every click, command, and mistake. #FforForensics #DigitalFootprints #UserActivity #DigitalForensics #DFIR …
…
continue reading
A mysterious package. A silent explosion. And a phone call that would change the course of forensic science forever. In this gripping first part of our series, we trace the origins of the Forensic Science Center at Lawrence Livermore National Lab through a decades-spanning investigation that began with the Unabomber and grew into a global hub for s…
…
continue reading
Bar presidents share strategies, tools and insights for attorneys growing into leadership roles. Learn from real stories of growth, crisis management, and innovation in NCBP’s Leading the Bar podcast. Listen monthly for compelling stories the next generation of lawyer-leaders can use to develop skills, confidence, and vision to lead with purpose an…
…
continue reading

1
Inside the Mind of a CIA Agent: Nuclear Threats and Intelligence Operations
54:56
54:56
Play later
Play later
Lists
Like
Liked
54:56Send us a text PodMatch PodMatch Automatically Matches Ideal Podcast Guests and Hosts For Interviews Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: htt…
…
continue reading

1
Techno, Timeline, and Training Truths
1:06:03
1:06:03
Play later
Play later
Lists
Like
Liked
1:06:03Send us a text We kick off this episode with highlights from the Techno Security Conference, our 80s-themed outfits, packed LEAPP labs, AI panel discussions, and great conversations with friends and colleagues across the field. We discuss Brett Shavers’ recent series on DFIR entry-level work, and share our thoughts on the need for better forensic t…
…
continue reading

1
Well-Being Interventions For Forensic Practitioners – Have Your Say
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04Dr Jo Morrissey joins Paul to discuss her research into wellbeing challenges faced by forensic practitioners worldwide. As Workforce Strategy Lead at the Forensic Capability Network, Dr Morrissey is conducting a comprehensive study examining mental health impacts across all forensic disciplines - from digital forensics to crime scene investigation,…
…
continue reading

1
Can Your Messaging Survive the Quantum Computing Threat?
52:41
52:41
Play later
Play later
Lists
Like
Liked
52:41Send us a text Anurag Lal discusses the critical importance of quantum-resistant encryption for enterprise messaging and the urgent need for organizations to prepare for the coming quantum computing revolution that will render current encryption methods obsolete. • Anurag's extensive background in technology from Apple to Sprint and participation i…
…
continue reading

1
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01Host Paul Gullon-Scott sits down with Tom Oldroyd, Director of Strategy and Sales at Semantics 21, to discuss S21’s digital forensics platform that prioritizes investigator mental health alongside cutting-edge technology. Drawing on his 17 years in policing and experience running a digital forensic unit, Tom highlights the psychological toll on inv…
…
continue reading
…
continue reading
In this episode of F for Forensics, we unpack the most cringe-worthy mistakes in digital forensics—from overwriting original evidence to remote-wiped phones and timestamp disasters. Whether you’re a pro or just getting started, this episode will make you laugh, wince, and walk away wiser. Thank you for listening! Find us on social media @FforForens…
…
continue reading

1
Mastering Social Media OSINT: SMI Aware's Secrets to Cyber Sleuthing
1:01:19
1:01:19
Play later
Play later
Lists
Like
Liked
1:01:19Picture this: you’re scrolling through social media, trying to piece together clues for a case, but the sheer volume of posts, profiles, and comments is overwhelming. Sound familiar? That’s why you need to tune into this episode of The Cyber Sleuth Show with Kevin DeLong and Josh Janow, CEO of SMI Aware. Josh pulls back the curtain on how his team …
…
continue reading

1
DFSP # 487 Unmasking Malicious Activity with 4688
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51
…
continue reading
At Lawrence Livermore National Laboratory, engineers and scientists are reimagining the way critical components for the U.S. nuclear stockpile are designed, tested, and produced. In this episode, we explore the Polymer Enclave - a groundbreaking collaboration with the Kansas City National Security Campus that has slashed production timelines from y…
…
continue reading

1
Unmasking Human Trafficking: Traditional and Digital Investigations
1:00:06
1:00:06
Play later
Play later
Lists
Like
Liked
1:00:06This episode contains discussions about human trafficking and child exploitation that may be distressing to some listeners. Listener discretion is advised. In this powerful episode of Data Discourse, host Pete Mansmann is joined by Jeff Stiegler of Precise Discovery, LLC., and Ashley Miller of CSI Investigators for a deep conversation into the hidd…
…
continue reading

1
Episode 4: “F is for Forensic Imaging: Capturing the Crime Scene
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57Episode 4: F is for Forensic Imaging – Capturing the Crime Scene In this episode of F for Forensics, Ben and Alex break down the essential process of forensic imaging—how investigators capture a complete, verifiable copy of digital media without altering the original. Learn about the tools, techniques, and real-world cases that make imaging the fir…
…
continue reading

1
The SHOCKING Truth About AI Security in Hospitals
46:09
46:09
Play later
Play later
Lists
Like
Liked
46:09Send us a text Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust. • Taylor's journey from aspiring physical therapist to cybersecurity expert thro…
…
continue reading

1
Techno Security East 2025 Wrap Up with Jennifer Salvadori
1:05:17
1:05:17
Play later
Play later
Lists
Like
Liked
1:05:17Join Kevin DeLong on The Cyber Sleuth Show for an exclusive wrap-up of the Techno Security & Digital Forensics Conference East 2025 with Jennifer Salvadori, Event Director. Fresh off the June 3-5 event in Wilmington, NC, Jennifer shares why the conference is relocating back to Myrtle Beach, what the vibrant coastal city brings to the table. They wi…
…
continue reading
…
continue reading

1
Live from Techno Security with Martino Jerian of Amped Software
16:23
16:23
Play later
Play later
Lists
Like
Liked
16:23Join Kevin as he speaks with Martino Jerian of Amped Software live from the Techno Security conference in Wilmington, NC.By Cyber Social Hub
…
continue reading

1
Live from Techno Security with Martin Westman of MSAB
37:50
37:50
Play later
Play later
Lists
Like
Liked
37:50Join Kevin live from Techno Security Conference in Wilmington, NC as he speaks to Martn Westman of MSAB. Here is Martins bio from the conference... lol Martin Westman has worked in the mobile device technology field since 1994. He has held many roles within MSAB over the last 20 years, bouncing back and forth between tech and development, and hes c…
…
continue reading

1
Live from Techno Security with Chad Gish of Magnet Forensics
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Join Kevin as he talks with Chad Gish of Magent Forensics https://www.magnetforensics.comBy Cyber Social Hub
…
continue reading

1
F for Fileless Malware - Attacks That Leave No Trace
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Ben and Alex uncover the stealthy world of fileless malware—attacks that run entirely in memory and leave no trace on disk. Learn how hackers use tools like PowerShell and WMI to slip past defenses, and how forensic pros can catch them using memory analysis, EDR tools, and clever log review. Thank you for listening! Find us on social media @FforFor…
…
continue reading
…
continue reading
What if scientists could use the peculiar world of quantum mechanics to design solutions once thought impossible - changing how we build, heal, and communicate? At Lawrence Livermore National Laboratory, researchers are developing quantum systems that could help us do just that. These machines think differently, tapping into the strange rules of qu…
…
continue reading

1
Reputation is Everything: How AI and Domain Security Shape Today's Threat Landscape
55:50
55:50
Play later
Play later
Lists
Like
Liked
55:50Send us a text Ihab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever. • Domain security is often overlooked despite being critical to an or…
…
continue reading
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
…
continue reading

1
Episode 7: Pioneering Al-Driven Mental Health 911 Response with Dr. Monica Nandan and Dr. Dominic Thomas
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44Dr. Monica Nandan and Dr. Dominic Thomas join Research Matters to discuss the creation of an AI-driven system that will allow first responders to more easily respond to emergency mental health calls. The project is a collaboration between Kennesaw State University, Cobb County Police Department, and Cobb Fire. Joining Dr. Nandan and Dr. Thomas are …
…
continue reading

1
Bridging the Gap Between IT & eDiscovery Providers w/ Matt Campbell & Bill Saccani
1:09:29
1:09:29
Play later
Play later
Lists
Like
Liked
1:09:29It’s Episode 2 of Season 2 of Data Discourse and today, we explore the evolving relationship between IT departments and eDiscovery providers - focusing strongly on how collaboration can lead to more efficient and cost-effective outcomes. Click play to join host Pete Mansmann, Matt Campbell of Steel River Techs, and Bill Saccani, President of Precis…
…
continue reading
Episode 2: F for Firmware – Forensics Beyond the OS In this episode, Ben and Alex dig into the hidden world of firmware forensics. Learn why malware in BIOS, UEFI, and IoT devices can persist beyond OS reinstalls—and how forensic pros uncover data hiding below the surface. From Binwalk to chip-off analysis, this one’s for the low-level nerds. Thank…
…
continue reading

1
DFSP # 483 Cooking up Forensics with Chef
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
…
continue reading