Why isn't talking tech as simple, quick, and agile as its innovations promise to be? Technology Untangled is just that - a show that deciphers tech's rapid evolutions with one simple question in mind: what's really going to shape our future (and what's going to end up in the bargain bin with the floppy disc)? Join your host Michael Bird as he untangles innovation through a series of interviews, stories, and analyses with some of the industry's brightest brains. No marketing speak, no unneces ...
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading

1
Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps
43:16
43:16
Play later
Play later
Lists
Like
Liked
43:16Send us a text This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response. If you’re in security operations, digital forensics, or incident response, this episode wi…
…
continue reading
Send us a text So You Want to Build Your Own DFIR CTF? Ever wanted to build your own Digital Forensics and Incident Response (DFIR) Capture the Flag (CTF) challenge but weren’t sure where to start? In this episode of Traffic Light Protocol, we share the how-to of CTF builders, making it easy for anyone—no pentesting skills required! Today's episode…
…
continue reading

1
Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43Send us a text Kicking off 2025, we're getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity. In this episode, we cover how to…
…
continue reading
We’re back, with a one-off episode looking at the challenges and opportunities tckled by leaders in their field throughout 2024, and looking ahead to 2025. 2024 has been quite a year. From elections and changes of Government around the world, to war, to lingering economic uncertainty - it has felt like the world is in a state of flux. But with unce…
…
continue reading

1
Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20Send us a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments. Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Activ…
…
continue reading

1
Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson
1:08:33
1:08:33
Play later
Play later
Lists
Like
Liked
1:08:33Send us a text In this episode of Traffic Light Protocol, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University. Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital…
…
continue reading

1
Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation & Forensics in the cloud, with Jacob Wilson
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Send us a text Episode 13 is another giant episode with a focus on what its like be in the mud working on real life forensic investigations. Jacob and Clint talk about ELK EDR, using Sysmon. Sandbox Environments: Jacob discusses the creation of a sandbox environment using an ELK stack combined with Sysmon, enabling in-depth malware analysis by capt…
…
continue reading

1
Episode 12 - You're forced to decide: Cyber Generalist or Cyber Specialist?
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Send us a text Quotes: “In the fast-paced world of DFIR, you are a mission critical system. Your job isn’t just to uncover what happened during an incident, but to do so in a way that gets results fast.” “Specialists bring expertise that pushes the entire industry forward, while generalists offer versatility and adaptability in the ever-changing la…
…
continue reading

1
Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew
52:46
52:46
Play later
Play later
Lists
Like
Liked
52:46Send us a text In this episode of Traffic Light Protocol, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when de…
…
continue reading

1
Episode 10 - Detecting and Preventing Phishing Attacks
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04Send us a text Quotes: "Phishing targets the human element, the 'wetware,' often the weakest link in any security chain." - Clint Marsden "Phishing isn't just about poorly spelled emails anymore; it's about sophisticated campaigns that even cyber-aware individuals can fall victim to." - Clint Marsden "Effective defense against phishing involves not…
…
continue reading

1
Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies
21:48
21:48
Play later
Play later
Lists
Like
Liked
21:48Send us a text Episode Title: "Unmasking APT40: Tactics, Challenges, and Defense Strategies" Key Takeaways: APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009. They target various sectors including academia, aerospace, defense, healthcare, and maritime industries. APT40 uses advanced tactics such as spear phish…
…
continue reading

1
Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and printer forensics ...
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57Send us a text In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget. Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. Event log cleared: Event ID 1102 ACSC Sysmon: https://git…
…
continue reading

1
Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures
17:07
17:07
Play later
Play later
Lists
Like
Liked
17:07Send us a text In todays episode of TLP - Traffic Light Protocol, Clint Marsden talks about Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures. Key Takeaways Understanding Scattered Spider: Scattered Spider, also known as Roasted Octopus or Octo Tempest, utilizes various legitimate tools for malicious purpos…
…
continue reading

1
Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo
26:11
26:11
Play later
Play later
Lists
Like
Liked
26:11Send us a text In this episode, we speak with Phil Ngo, a Primary Investigator in Accenture's global cyber response team. As a primary investigator, he is responsible for helping clients recover from major incidents as well as delivering proactive cyber services, such as threat hunting and tabletop exercises. Philip started his career as a high sch…
…
continue reading

1
Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity)
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06Send us a text This is the biggest episode from a content perspective so far. I'm excited to share it with you. Episode Highlights: How to run post-incident debriefs and post-mortems. Involving external teams Using lessons learned to form actionable insights. Key questions to address in incident analysis. Effective report writing strategies, includ…
…
continue reading

1
Episode 4 - NIST SP 800-61 Computer Security Incident Handling Guide (Containment,Eradication and Recovery)
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10Send us a text Show Notes: Episode on Containment, Eradication, and Recovery In this episode of Traffic Light Protocol, Clint Marsden explores the containment, eradication, and recovery phases of the NIST SP 800-61 framework for computer security incident handling. Key Topics Covered: Containment Strategies: Choosing appropriate containment methods…
…
continue reading

1
Episode 3 - (Part 2) NIST SP 800-61 Computer Security Incident Handling Guide (Detection)
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41Send us a text In this conclusion of the Detection phase, Clint wraps up Incident Prioritisation. This includes Functional impacts of the incident, information impact of the incident and the recoverability of the incident. Not all of these are needed, or relevant when tracking your incident and Clint explains when to categorise incidents using thes…
…
continue reading

1
Episode 3 - NIST SP 800-61 Computer Security Incident Handling Guide (Detection)
46:52
46:52
Play later
Play later
Lists
Like
Liked
46:52Send us a text In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61. Attack vectors for digital security incidents, including insider threats and weaponized USBs. Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation The importance of following temporal…
…
continue reading

1
Episode 2 - NIST SP 800-61 Computer Security Incident Handling Guide (Preparation)
27:17
27:17
Play later
Play later
Lists
Like
Liked
27:17Send us a text In this Episode Clint Marsden talks about the first phase of Computer Security Incident Handling according to NIST. Listen to real world examples of how to get prepared before a Cyber Security Incident arrives. Show notes: Link to NIST SP 800-61 PDF https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf Bro has be…
…
continue reading

1
Episode 1 - Digital forensics trends and preparations, learning from real life case studies & DFIR training for getting started
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27Send us a text In this first episode we kick off with Clint Marsden, the host of Traffic Light Protocol (TLP) where he talks about what its like to work in DFIR, how to get started with Cyber training, what to expect in future episodes, and of course a light touch on AI Forensics! Join us for the first episode. The next episodes coming up talk abou…
…
continue reading

1
Can international collaboration help to fight cybercrime?
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53We’ve spoken before on this podcast about cyber security and protecting yourself from cyber crime - but what is being done to tackle the phenomenon internationally? That’s what we’re looking at in this episode. We’ve bought together some of the most senior global figures on cyber crime to find out how international collaboration and public/private …
…
continue reading
In this episode we are looking at the challenges AI technology faces when it comes to becoming, and then remaining sustainable. The benefits of AI are unquestionable: from improved medical assistance and increased efficiency in the workplace, to autonomous transportation and next-level gaming experiences. But the more expansive the abilities of AI …
…
continue reading

1
The future of storage tech: Can the tech of the past influence the tech of tomorrow?
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44In this episode, we’re taking a look at how the explosion in our demand for data storage has led to needing more capacity than ever before, and whether long-vanished ideas from our computing past could influence technological innovation in the future. In 2022 the world generated 97 Zettabytes of data. It has been predicted that, by 2025, that numbe…
…
continue reading
In this episode, we'll explore how technology is changing the way we communicate. But much more than that, we're going to be looking at how it's actually changing our relationship with language itself. Ever since the first pictograms which date way back over 5000 years, we've been searching for technologies to communicate with each other in more wi…
…
continue reading

1
Connectivity in sports: How are connectivity and bandwidth creating the venues of the future?
36:29
36:29
Play later
Play later
Lists
Like
Liked
36:29Sports and data are closely intertwined – and that’s especially true for spectators. So how can data, analytics, IoT and connectivity create better experiences fans? In this episode, we’re taking a look at how major sports venues and events are using technology to create the perfect experience for their customers. It's something that’s been a recur…
…
continue reading

1
Routes into STEM – Could apprenticeships solve the tech talent crunch?
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Routes into STEM – Could apprenticeships solve the tech talent crunch? There’s an acute shortage of candidates for tech jobs – in fact, research suggests tens of millions of potential roles are going unfilled. In a poll with global technology chiefs conducted by MIT’s ‘Technology Review’, a majority found that they weren’t getting enough candidates…
…
continue reading

1
AI in Healthcare: Are we ready for data to examine us?
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56You've heard it from us before on this podcast, but we'll say it again. AI is transforming our world. Depending on which market research you look at, AI in healthcare is already somewhere from a 14-21 billion dollar industry in 2023, which is almost double what it was worth just two years ago. By 2028, it's set to be a 100 billion dollar global ind…
…
continue reading

1
Exascale: Are we ready for the next generation of supercomputers?
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57The dawn of the exascale computer has arrived. In May 2022, a computer named Frontier was switched on at the Oak Ridge National Laboratory in the USA. At well over twice the computing power of the previous world record holder, it has ushered in a new era of supercomputers, with at least two more to follow in the coming months and years. In this epi…
…
continue reading

1
Keeping the lights on part 2: How do we optimize our energy usage?
45:32
45:32
Play later
Play later
Lists
Like
Liked
45:32The world’s energy supply is in a state of flux. Australian coal is being bought up by China faster than it can be mined, Europe is coming to terms with Russian gas being shut off, and the US is grappling with how to produce more energy whilst meeting green targets and keeping people in mining areas employed. It’s a tough balancing act. In the last…
…
continue reading

1
Keeping the lights on part 1: How do we make more energy?
36:05
36:05
Play later
Play later
Lists
Like
Liked
36:05The world is in a state of flux when it comes to energy production. Australian coal is being bought up by China as fast as it can be mined, Europe is coming to terms with Russian gas supplies being a bargaining chip in international politics, and the US is grappling with how to produce more energy whilst meeting green targets and keeping people in …
…
continue reading

1
Can technology help to rebuild after disasters?
47:04
47:04
Play later
Play later
Lists
Like
Liked
47:042022 saw 421 registered natural disasters worldwide, including floods, drought, famine and earthquakes. It also saw new or escalating conflicts in Sudan, Syria and Ukraine. Thousands of NGOs, activists and charity groups do what they can to help those in need, whilst Governments and research groups try to come up with better ways of predicting, mit…
…
continue reading
Bad AI is becoming a major headache for organizations. Tech is a male-dominated sphere, which means that it produces, inherently, male-skewed AI driven by unconsciously biased datasets. The effects of this can be measurable. Run through the same AI, women can receive worse credit or loan agreements than their male counterparts, be pushed out from j…
…
continue reading

1
Welcome to Technology Untangled: Season 4 Trailer
2:11
2:11
Play later
Play later
Lists
Like
Liked
2:11Welcome to season four of Technology Untangled from Hewlett Packard Enterprise. A new series means a new format, so join your hosts - yes, plural - Michael Bird and Aubrey Lovell in unravelling the stories and technologies which are changing the way we work. Every two weeks, we take a look at an emergent story in technology and interview experts fr…
…
continue reading
We hear a lot about Big Data. But what does it actually mean? Is it, quite simply, lots of data? Or is there more to it than that? Spoiler alert, there is. A lot more. In this episode, we're taking a look at the age of insight, and how Big Data has evolved from a technical concept to a way of extracting enormous value from the fumes of data meant f…
…
continue reading

1
Ransomware Attacks: Should we be worried?
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13Cyber Security is big business. In fact, it's estimated to be worth $160 billion. But that's likely to be peanuts compared to the value of cyber crime, which is estimated to cost the global economy $600 billion in 2022 - nearly 1% of the global economy. And just one corner of that - ransomware - costs the same in damage and paid-out fees as the ent…
…
continue reading

1
Lessons from 2022: Turning challenges into opportunities
34:08
34:08
Play later
Play later
Lists
Like
Liked
34:082022 has not been a straightforward year. A war in Ukraine has seen the world divided and global energy and food supplies disrupted. International tensions between China and Taiwan have reared their heads again. Recession is looming in many parts of the world, and whilst it makes less headlines, Covid is still very much a part of our lives. But org…
…
continue reading

1
Autonomous vehicles: Are we steering in the right direction?
42:10
42:10
Play later
Play later
Lists
Like
Liked
42:10Autonomous vehicles are a hot topic. Their incredible ability – and at times lack of it – is a source of controversy as much as a source of wonder, from avoidable crashes to drivers literally sleeping at the wheel. What's undeniable is that you can now theoretically sit in a car and let it take control as it guides you along the road. But is that a…
…
continue reading

1
World poverty: Is technology the great leveller?
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46Since 1990, the global rates of extreme poverty have gone from around 40% to around 10%, and ending World Poverty entirely by 2030 is one of the UN’s Key Sustainable Development Goals, announced in 2015. However, progress is slowing, and 710 million people around the world still live in extreme poverty - currently earning below $1.90 per day. So ho…
…
continue reading

1
World hunger: Can technology help feed the world?
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39Ending World Hunger by 2030 is one of the UN’s Key Sustainable Development Goals, announced in 2015. We’re now half way to the final milepost, but estimates still put the number of people in the world who are suffering from hunger and malnutrition at around 811 million, more than 9% of the world's population. So how can tech help? In this episode, …
…
continue reading

1
Technology in Sport: A race against the machine?
39:53
39:53
Play later
Play later
Lists
Like
Liked
39:53Professional sport is a world where individuals can earn as much as a decent-sized business, and teams have evolved to become multi-national corporations. And where there's money, technology follows. In this episode, we'll be meeting with amazing people at the cutting edge of sports technology to look at how data has become a key part of the field …
…
continue reading
The Cloud has become a backbone of the world economy over the last decade, powering everything from streaming services to mobile banking. It’s a fantastic resource, but as time goes on the limits of the Cloud are becoming clearer, from over-reliance issues to incompatibility with legacy hardware. This week - part 2 of a 2 part special - we’re takin…
…
continue reading
The Cloud has become a backbone of the world economy over the last decade, powering everything from streaming services to mobile banking. It’s a fantastic resource, but as time goes on the limits of the Cloud are becoming clearer, from over-reliance issues to incompatibility with legacy hardware. This week - part 1 of a 2 part special - we’re takin…
…
continue reading
Technology Untangled is back for a third series. ‘Friendly’ autonomous vehicles, AI, satellites, plotting food supplies, dependencies, hybrid cloud, hyperscalers, skeletal scanning, ransomware, Virtual Referees, Technological Doping, Big Data, AI, Poker-playing robots, Racing scooters, Sustainability, on-prem, colo, trust, graphine, AI sports coach…
…
continue reading

1
2021 Untangled: Are things remotely normal yet?
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49By HPE, Michael Bird, Antonio Neri, Anthesis Group CEO Stuart McLachlan, Micro:bit Edcuational Foundation CEO Gareth Stockdale, Susie Wolff CEO, ROKiT Venturi Racing, Formula E
…
continue reading
By HPE, Michael Bird, Andrew Emerson, Chris Dando, Colin Wood, Dan Broomham, Dave Strong, Eng Lim Goh, Florian Buehr, Ian Henderson, Jacob Balma, Jen Hawes-Hewitt, Jimmy Chion, John Frey, Jordan Appleson, Lauren Dyer, Leslie Shannon, Mark Fernandez, Mary Towers Matt Armstrong-Barnes, Puneet Sharma, Rasha Hasaneen, Ray Beausoleil, Sarah McCarthy, Simon Peyton-Jones, Simon Wilson, Toju Duke
…
continue reading

1
Mission to Mars: How far can we push the edge?
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32By HPE, Michael Bird, Eng Lim Goh, Mark Fernandez, Timothy Lang, NASA Marshall Space Flight Centre
…
continue reading
By Hewlett Packard Enterprise
…
continue reading

1
Quantum Computing: Superposition or qubit too far?
45:20
45:20
Play later
Play later
Lists
Like
Liked
45:20By HPE, Hewlett Packard Enterprise, Michael Bird, Tony Stranack, Ray Beausoleil, Sarah McCarthy, Hewlett Packard Labs, University of Waterloo
…
continue reading
By HPE UK&I, Michael Bird, Eng Lim Goh, Tony Costa, Florian Buehr, Bumble Bee Foods
…
continue reading
By HPE UKIMESA, Michael Bird, John Frey, Ian Henderson, Trane Technologies, Rasha Hasaneen, Jordan Appleson, Hark
…
continue reading