Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Technology Untangled

Hewlett Packard Enterprise

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Why isn't talking tech as simple, quick, and agile as its innovations promise to be? Technology Untangled is just that - a show that deciphers tech's rapid evolutions with one simple question in mind: what's really going to shape our future (and what's going to end up in the bargain bin with the floppy disc)? Join your host Michael Bird as he untangles innovation through a series of interviews, stories, and analyses with some of the industry's brightest brains. No marketing speak, no unneces ...
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Loading …
show series
 
Send us a text This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response. If you’re in security operations, digital forensics, or incident response, this episode wi…
  continue reading
 
Send us a text So You Want to Build Your Own DFIR CTF? Ever wanted to build your own Digital Forensics and Incident Response (DFIR) Capture the Flag (CTF) challenge but weren’t sure where to start? In this episode of Traffic Light Protocol, we share the how-to of CTF builders, making it easy for anyone—no pentesting skills required! Today's episode…
  continue reading
 
Send us a text Kicking off 2025, we're getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity. In this episode, we cover how to…
  continue reading
 
We’re back, with a one-off episode looking at the challenges and opportunities tckled by leaders in their field throughout 2024, and looking ahead to 2025. 2024 has been quite a year. From elections and changes of Government around the world, to war, to lingering economic uncertainty - it has felt like the world is in a state of flux. But with unce…
  continue reading
 
Send us a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments. Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Activ…
  continue reading
 
Send us a text In this episode of Traffic Light Protocol, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University. Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital…
  continue reading
 
Send us a text Episode 13 is another giant episode with a focus on what its like be in the mud working on real life forensic investigations. Jacob and Clint talk about ELK EDR, using Sysmon. Sandbox Environments: Jacob discusses the creation of a sandbox environment using an ELK stack combined with Sysmon, enabling in-depth malware analysis by capt…
  continue reading
 
Send us a text Quotes: “In the fast-paced world of DFIR, you are a mission critical system. Your job isn’t just to uncover what happened during an incident, but to do so in a way that gets results fast.” “Specialists bring expertise that pushes the entire industry forward, while generalists offer versatility and adaptability in the ever-changing la…
  continue reading
 
Send us a text In this episode of Traffic Light Protocol, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when de…
  continue reading
 
Send us a text Quotes: "Phishing targets the human element, the 'wetware,' often the weakest link in any security chain." - Clint Marsden "Phishing isn't just about poorly spelled emails anymore; it's about sophisticated campaigns that even cyber-aware individuals can fall victim to." - Clint Marsden "Effective defense against phishing involves not…
  continue reading
 
Send us a text Episode Title: "Unmasking APT40: Tactics, Challenges, and Defense Strategies" Key Takeaways: APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009. They target various sectors including academia, aerospace, defense, healthcare, and maritime industries. APT40 uses advanced tactics such as spear phish…
  continue reading
 
Send us a text In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget. Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. Event log cleared: Event ID 1102 ACSC Sysmon: https://git…
  continue reading
 
Send us a text In todays episode of TLP - Traffic Light Protocol, Clint Marsden talks about Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures. Key Takeaways Understanding Scattered Spider: Scattered Spider, also known as Roasted Octopus or Octo Tempest, utilizes various legitimate tools for malicious purpos…
  continue reading
 
Send us a text In this episode, we speak with Phil Ngo, a Primary Investigator in Accenture's global cyber response team. As a primary investigator, he is responsible for helping clients recover from major incidents as well as delivering proactive cyber services, such as threat hunting and tabletop exercises. Philip started his career as a high sch…
  continue reading
 
Send us a text This is the biggest episode from a content perspective so far. I'm excited to share it with you. Episode Highlights: How to run post-incident debriefs and post-mortems. Involving external teams Using lessons learned to form actionable insights. Key questions to address in incident analysis. Effective report writing strategies, includ…
  continue reading
 
Send us a text Show Notes: Episode on Containment, Eradication, and Recovery In this episode of Traffic Light Protocol, Clint Marsden explores the containment, eradication, and recovery phases of the NIST SP 800-61 framework for computer security incident handling. Key Topics Covered: Containment Strategies: Choosing appropriate containment methods…
  continue reading
 
Send us a text In this conclusion of the Detection phase, Clint wraps up Incident Prioritisation. This includes Functional impacts of the incident, information impact of the incident and the recoverability of the incident. Not all of these are needed, or relevant when tracking your incident and Clint explains when to categorise incidents using thes…
  continue reading
 
Send us a text In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61. Attack vectors for digital security incidents, including insider threats and weaponized USBs. Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation The importance of following temporal…
  continue reading
 
Send us a text In this Episode Clint Marsden talks about the first phase of Computer Security Incident Handling according to NIST. Listen to real world examples of how to get prepared before a Cyber Security Incident arrives. Show notes: Link to NIST SP 800-61 PDF https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf Bro has be…
  continue reading
 
Send us a text In this first episode we kick off with Clint Marsden, the host of Traffic Light Protocol (TLP) where he talks about what its like to work in DFIR, how to get started with Cyber training, what to expect in future episodes, and of course a light touch on AI Forensics! Join us for the first episode. The next episodes coming up talk abou…
  continue reading
 
We’ve spoken before on this podcast about cyber security and protecting yourself from cyber crime - but what is being done to tackle the phenomenon internationally? That’s what we’re looking at in this episode. We’ve bought together some of the most senior global figures on cyber crime to find out how international collaboration and public/private …
  continue reading
 
In this episode we are looking at the challenges AI technology faces when it comes to becoming, and then remaining sustainable. The benefits of AI are unquestionable: from improved medical assistance and increased efficiency in the workplace, to autonomous transportation and next-level gaming experiences. But the more expansive the abilities of AI …
  continue reading
 
In this episode, we’re taking a look at how the explosion in our demand for data storage has led to needing more capacity than ever before, and whether long-vanished ideas from our computing past could influence technological innovation in the future. In 2022 the world generated 97 Zettabytes of data. It has been predicted that, by 2025, that numbe…
  continue reading
 
In this episode, we'll explore how technology is changing the way we communicate. But much more than that, we're going to be looking at how it's actually changing our relationship with language itself. Ever since the first pictograms which date way back over 5000 years, we've been searching for technologies to communicate with each other in more wi…
  continue reading
 
Sports and data are closely intertwined – and that’s especially true for spectators. So how can data, analytics, IoT and connectivity create better experiences fans? In this episode, we’re taking a look at how major sports venues and events are using technology to create the perfect experience for their customers. It's something that’s been a recur…
  continue reading
 
Routes into STEM – Could apprenticeships solve the tech talent crunch? There’s an acute shortage of candidates for tech jobs – in fact, research suggests tens of millions of potential roles are going unfilled. In a poll with global technology chiefs conducted by MIT’s ‘Technology Review’, a majority found that they weren’t getting enough candidates…
  continue reading
 
You've heard it from us before on this podcast, but we'll say it again. AI is transforming our world. Depending on which market research you look at, AI in healthcare is already somewhere from a 14-21 billion dollar industry in 2023, which is almost double what it was worth just two years ago. By 2028, it's set to be a 100 billion dollar global ind…
  continue reading
 
The dawn of the exascale computer has arrived. In May 2022, a computer named Frontier was switched on at the Oak Ridge National Laboratory in the USA. At well over twice the computing power of the previous world record holder, it has ushered in a new era of supercomputers, with at least two more to follow in the coming months and years. In this epi…
  continue reading
 
The world’s energy supply is in a state of flux. Australian coal is being bought up by China faster than it can be mined, Europe is coming to terms with Russian gas being shut off, and the US is grappling with how to produce more energy whilst meeting green targets and keeping people in mining areas employed. It’s a tough balancing act. In the last…
  continue reading
 
The world is in a state of flux when it comes to energy production. Australian coal is being bought up by China as fast as it can be mined, Europe is coming to terms with Russian gas supplies being a bargaining chip in international politics, and the US is grappling with how to produce more energy whilst meeting green targets and keeping people in …
  continue reading
 
2022 saw 421 registered natural disasters worldwide, including floods, drought, famine and earthquakes. It also saw new or escalating conflicts in Sudan, Syria and Ukraine. Thousands of NGOs, activists and charity groups do what they can to help those in need, whilst Governments and research groups try to come up with better ways of predicting, mit…
  continue reading
 
Bad AI is becoming a major headache for organizations. Tech is a male-dominated sphere, which means that it produces, inherently, male-skewed AI driven by unconsciously biased datasets. The effects of this can be measurable. Run through the same AI, women can receive worse credit or loan agreements than their male counterparts, be pushed out from j…
  continue reading
 
Welcome to season four of Technology Untangled from Hewlett Packard Enterprise. A new series means a new format, so join your hosts - yes, plural - Michael Bird and Aubrey Lovell in unravelling the stories and technologies which are changing the way we work. Every two weeks, we take a look at an emergent story in technology and interview experts fr…
  continue reading
 
We hear a lot about Big Data. But what does it actually mean? Is it, quite simply, lots of data? Or is there more to it than that? Spoiler alert, there is. A lot more. In this episode, we're taking a look at the age of insight, and how Big Data has evolved from a technical concept to a way of extracting enormous value from the fumes of data meant f…
  continue reading
 
Cyber Security is big business. In fact, it's estimated to be worth $160 billion. But that's likely to be peanuts compared to the value of cyber crime, which is estimated to cost the global economy $600 billion in 2022 - nearly 1% of the global economy. And just one corner of that - ransomware - costs the same in damage and paid-out fees as the ent…
  continue reading
 
2022 has not been a straightforward year. A war in Ukraine has seen the world divided and global energy and food supplies disrupted. International tensions between China and Taiwan have reared their heads again. Recession is looming in many parts of the world, and whilst it makes less headlines, Covid is still very much a part of our lives. But org…
  continue reading
 
Autonomous vehicles are a hot topic. Their incredible ability – and at times lack of it – is a source of controversy as much as a source of wonder, from avoidable crashes to drivers literally sleeping at the wheel. What's undeniable is that you can now theoretically sit in a car and let it take control as it guides you along the road. But is that a…
  continue reading
 
Since 1990, the global rates of extreme poverty have gone from around 40% to around 10%, and ending World Poverty entirely by 2030 is one of the UN’s Key Sustainable Development Goals, announced in 2015. However, progress is slowing, and 710 million people around the world still live in extreme poverty - currently earning below $1.90 per day. So ho…
  continue reading
 
Ending World Hunger by 2030 is one of the UN’s Key Sustainable Development Goals, announced in 2015. We’re now half way to the final milepost, but estimates still put the number of people in the world who are suffering from hunger and malnutrition at around 811 million, more than 9% of the world's population. So how can tech help? In this episode, …
  continue reading
 
Professional sport is a world where individuals can earn as much as a decent-sized business, and teams have evolved to become multi-national corporations. And where there's money, technology follows. In this episode, we'll be meeting with amazing people at the cutting edge of sports technology to look at how data has become a key part of the field …
  continue reading
 
The Cloud has become a backbone of the world economy over the last decade, powering everything from streaming services to mobile banking. It’s a fantastic resource, but as time goes on the limits of the Cloud are becoming clearer, from over-reliance issues to incompatibility with legacy hardware. This week - part 2 of a 2 part special - we’re takin…
  continue reading
 
The Cloud has become a backbone of the world economy over the last decade, powering everything from streaming services to mobile banking. It’s a fantastic resource, but as time goes on the limits of the Cloud are becoming clearer, from over-reliance issues to incompatibility with legacy hardware. This week - part 1 of a 2 part special - we’re takin…
  continue reading
 
Technology Untangled is back for a third series. ‘Friendly’ autonomous vehicles, AI, satellites, plotting food supplies, dependencies, hybrid cloud, hyperscalers, skeletal scanning, ransomware, Virtual Referees, Technological Doping, Big Data, AI, Poker-playing robots, Racing scooters, Sustainability, on-prem, colo, trust, graphine, AI sports coach…
  continue reading
 
By HPE, Michael Bird, Andrew Emerson, Chris Dando, Colin Wood, Dan Broomham, Dave Strong, Eng Lim Goh, Florian Buehr, Ian Henderson, Jacob Balma, Jen Hawes-Hewitt, Jimmy Chion, John Frey, Jordan Appleson, Lauren Dyer, Leslie Shannon, Mark Fernandez, Mary Towers Matt Armstrong-Barnes, Puneet Sharma, Rasha Hasaneen, Ray Beausoleil, Sarah McCarthy, Simon Peyton-Jones, Simon Wilson, Toju Duke
  continue reading
 
Loading …
Listen to this show while you explore
Play