Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
DFIR Podcasts
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
Come join Lee Reiber as he discusses some digital forensic gold. Also the home for the Forensic Happy Hour with guests from the DFIR community.
…
continue reading
Forensic Fix is a podcast from MSAB that covers the latest news and trends in the field of Digital Forensics. The show features guests from the industry who share their insights, experiences, and advice on various topics related to Digital Forensics. The podcast covers a wide range of subjects, including mobile device forensics, welfare, industry news and more. Listeners can expect to hear about the latest tools and techniques used by Digital Forensic professionals, as well as how the field ...
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
We take the digital forensics news of today and forecast the future long term impact to our industry, both positive and negative.
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading

1
Monitoring the Dark Web for Leaked Data in DFIR
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Got a question or comment? Message us here! 🔎 This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@a…
…
continue reading

1
💢 FileFix Fiasco 💢 Steganography's Stealthy StealC Drop
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
…
continue reading

1
Brutally Honest Security | Episode 1: September 22, 2025
2:25:01
2:25:01
Play later
Play later
Lists
Like
Liked
2:25:01When it comes to cybersecurity, sugarcoating is not an option. Brutally Honest Security cuts through the noise with raw, unfiltered insights from Eric Taylor — a seasoned digital forensics and incident response (DFIR) expert known for his “no-holds-barred” style. Each episode dives straight into the heart of information security: 🔥 Ransomware updat…
…
continue reading

1
From US Intelligence to DoD Cyber Ops: Frank & Dustin’s Origin Stories in Cybersecurity
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer open up about their real beginnings—from accidental entry into US Intelligence after 9/11, to packet-hunting puzzles, Wi-Fi tinkering, and Linux dependenc…
…
continue reading

1
Episode 24: Voice AI Under Attack: Hackers Exploit AI Call Agents | Traffic Light Protocol Podcast
54:31
54:31
Play later
Play later
Lists
Like
Liked
54:31Send us a text Voice AI is moving fast — but so are the attackers. In this episode of the Traffic Light Protocol Podcast, Clint and Myles break down how scammers are exploiting Voice AI platforms with the same tricks that wrecked email and telecom decades ago: Premium-rate fraud dressed up in AI clothing Bot-driven spam that floods calendars and bu…
…
continue reading

1
Secret Algorithms Controlling You! Are You the User… or the Product?
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news, drives, purchases, health, and even relationships. From TikTok fear-mongering to Cambridge Analytica, OPM’s breach fallout, Google Maps routing incentives, Amazon “sponsored” defaults, and Facebook’s en…
…
continue reading

1
Mastering Incident Response: Essential for SOC Success
8:41
8:41
Play later
Play later
Lists
Like
Liked
8:41Got a question or comment? Message us here! 💡 This week on The SOC Brief, we’re breaking down incident response (IR) ... why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputati…
…
continue reading

1
Responsible AI or Responsible Marketing? A CISO’s Take
47:30
47:30
Play later
Play later
Lists
Like
Liked
47:30"I get it. I need to stop banging on the table. This will be fixed in future episodes. Sorry for the poor sound experience." - David Get your Responsible AI Vendor Due Diligence Checklist here: https://webforms.pipedrive.com/f/ccV6a7kFIWKZpodmLcDbBhKhYnVU5N81A2tM20DGC8gepc0UtzfcqYaHXfzBi8gzuz Episode Summary: In this episode of The Professional CIS…
…
continue reading

1
Episode 23:AI Voice Agent Security: Voice AI Under Siege: SIP Spoofing, Cost Drain, and How to Fight Back
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29Send us a text In this episode of Traffic Light Protocol, we kick off our AI series with a hard look at how voice AI agents are being targeted; and how fast small businesses and startups can rack up serious bills overnight. Guest Myles Agnew returns to unpack how old-school telecom tricks are being repurposed in the age of SIP/VoIP and AI: caller I…
…
continue reading

1
From Submarines to Cybersecurity: Chris Adkins’ Wild Journey Into Cyber Defense
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity. In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep with Chris as he shares his unique journey from being a sonar technician in the U.S. Navy to breaking into cyber through a SOC—a…
…
continue reading
Send us a text We celebrate our two-year podcast anniversary and discuss the importance of thorough case preparation for CSAM cases, courtroom experience, and extracting evidence from iOS devices. • SANS Difference Maker Awards open for nominations through September 15th across multiple categories • AI debate webinar with Magnet Forensics scheduled…
…
continue reading
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
…
continue reading

1
He Helped Take Down the Dark Web (Twice) — Vincent D’Agostino on DFIR, FBI & Real-World Cyber
1:01:27
1:01:27
Play later
Play later
Lists
Like
Liked
1:01:27Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpack dark web takedowns, real DFIR process, and how a “range” of skills (law, tech, stand-up, curiosity) compounds into cyber success. We cover: How a team helped take down the dark web—twice DFIR reality vs myth…
…
continue reading

1
⚠️ Crypto24 ⚠️ Ransomware: Bypassing EDR and Bolstering Defenses
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead o…
…
continue reading

1
AI Adoption vs. Security Reality — Insights from GPSEC STL
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01Sponsors: ObservoAI (www.observo.ai) Guidepoint Security (www.guidepointsecurity.com) Episode Summary: AI isn’t just hype anymore — it’s transforming the way enterprises operate. At GPSEC St. Louis, David Malicoat sits down with Felix Simmons, Principal Security Architect at GuidePoint Security, to cut through the noise around AI adoption, risk, an…
…
continue reading

1
ChatGPT-5: Smarter Hackers, Dumber Defenders?
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break down the hype vs. reality. From coding disasters that “look pretty but don’t work,” to AI being more like “that coworker who makes everything harder,” we explore what this means for hackers, defenders, and t…
…
continue reading

1
🚨 Gone Vishing: The Recent Surge of Vishing Attacks
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50Got a question or comment? Message us here! This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the #1 attack vector and how to stay one step ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcas…
…
continue reading

1
Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03Hannah Bailey, founder of Blue Light Wellbeing, joins the Forensic Focus Podcast to share her powerful journey from frontline policing to becoming a psychotherapist, trauma therapist, and well-being coach. Drawing on 15 years in the police — including CID and major crime — Hannah brings unique cultural credibility to her work supporting digital for…
…
continue reading

1
EP82: Lessons from CISO XC DFW: Leadership, Risk & Real-World Security
38:04
38:04
Play later
Play later
Lists
Like
Liked
38:04Summary: Recorded live at CISO XC DFW, this episode of The Professional CISO Show features three powerful conversations from leaders shaping the future of cybersecurity. First, Sonya Wickel shares her 24-year career journey from IT generalist to CISO & CIO, offering insights on fourth-party risk, the value of empathy in leadership, and the importan…
…
continue reading

1
From Recon to Wrecked: The Cyber Kill Chain Breakdown (With Laughs)
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56What if you could break down every cyberattack into just 7 steps? In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep into the Cyber Kill Chain — Lockheed Martin’s 7-stage framework for understanding and stopping attacks — and compare it to the MITRE ATT&CK framework, hacker methodology, and even… honeypots, magicians, and Chris…
…
continue reading
Got a question or comment? Message us here! On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersec…
…
continue reading

1
From Data Governance to AI Security: Kristi Cook on Building Resilient Teams
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46Sponsors AIM Security (www.aim.security) Guidepoint Security (www.guidepointsecurity.com) Kristi Cook, Head of Cybersecurity at Peabody Energy, joins David Malicoat live from GPSEC St. Louis — with AIM Security as our midday sponsor — to discuss how she’s leading her team through AI adoption, data governance, and talent development. From leveraging…
…
continue reading

1
Quantum Day is Coming: Will Quantum Computing Break Cybersecurity?
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06Quantum computing is no longer science fiction—it’s a ticking clock for modern encryption. In this episode of Legitimate Cybersecurity, Frank and Dustin break down Q-Day, the moment when quantum computers may render current cryptography useless. We explore how close we really are, the science (and hype) behind quantum technology, and what CISOs sho…
…
continue reading

1
From Cryptic Apps to Clickable Maps: Making Sense of Digital Evidence
1:16:20
1:16:20
Play later
Play later
Lists
Like
Liked
1:16:20Send us a text We're back! After a short break we are back to discuss the growing crossover between real-world events and digital evidence in court cases, highlighting how device data can make or break timelines in high-stakes investigations. This episode covers: Ian Whiffin’s latest forensic work, including iOS power log timestamps, Apple Health d…
…
continue reading

1
Spilling the Tea: What Happens When Apps Launch Without Locking Down Security ☕
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23Got a question or comment? Message us here! This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes. Suppo…
…
continue reading

1
CISO XC Live: Conversations on Innovation and Threats
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07Sponsored by HivePro (www.hivepro.com) and CISO XC (www.cisoxc.com). EP80 – CISO XC DFW | Hive Pro Special: AI, Identity & The Future of Cyber Roles Live from CISO XC DFW, The Professional CISO Show dives into the intersection of innovation, leadership, and cyber resilience. Host David Malicoat sits down with: Ted Sanders, BISO and cybersecurity ed…
…
continue reading
Got a question or comment? Message us here! A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND it’s already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-f…
…
continue reading

1
Digital Forensics And Stress: Understanding Your Body’s Signals
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45Dr Zoe Billings and Mark Pannone from Adapt & Evolve join Paul to discuss their unique approach to mental health and well-being in digital forensics. Dr Billings is a biologist and former senior investigator, while Mark is a former Assistant Chief Constable. Together they've developed a model that focuses on recognising the early biological signs o…
…
continue reading

1
Internet of (Terrifying) Things: IoT Hacks, Biochips & Beer Bots
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart thermostats and connected doorknobs to pacemakers with IP addresses and hacked fish tanks. You’ll hear real-life stories of IoT gone wrong (including a connected beer brewer used for hacking), explore the c…
…
continue reading
Takeaways Mental health support is crucial for law enforcement professionals. Proactive approaches can prevent severe mental health issues. Stigmas around mental health often prevent individuals from seeking help. Therapy has evolved and can be more solution-focused today. You don't need a diagnosis to seek therapy. Recognizing signs of burnout is …
…
continue reading
Got a question or comment? Message us here! In this week’s #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and …
…
continue reading

1
From DFIR Godfather to AI Risk Advocate: Rob T. Lee on Cybersecurity’s Crossroads | RSA 2025
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05In this special RSA Conference edition of The Professional CISO Show, host David Malicoat sits down with Rob T. Lee—Chief of Research at SANS Institute and a foundational figure in cybersecurity. With nearly three decades of experience spanning the Air Force, Mandiant, and SANS, Rob shares his insights on the evolving challenges of the CISO role, t…
…
continue reading

1
Aligned by Design: CISO x Legal in Practice - Episode 92
54:40
54:40
Play later
Play later
Lists
Like
Liked
54:40Got a question or comment? Message us here! 🎙️ NEW! Aligned by Design: CISO x Legal Introducing! A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide. From real-world expe…
…
continue reading

1
We’re Losing the Cyber War — Here’s Why | UMD’s Charles Harry
53:21
53:21
Play later
Play later
Lists
Like
Liked
53:21Dr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to expose the hidden gaps in U.S. cyber defense. From nation-state strategy to local school vulnerabilities, this episode uncovers why most cybersecurity efforts are missing the mark… and how to fix it. We ex…
…
continue reading
Got a question or comment? Message us here! Hackers just unleashed the largest DDoS attack in history, peaking at 7.3 Tbps and 4.8 billion packets per second. In just 45 seconds, it pummeled its target with the data equivalent of over 9,000 HD movies, a powerful reminder of how far attack capabilities have evolved. 🎧 Tune in to today’s SOC Brief fo…
…
continue reading

1
Event Series EP 78: AI, Data, and Talent: CISO Lessons from GPSEC STL
14:18
14:18
Play later
Play later
Lists
Like
Liked
14:18Sponsors: Rubrik (www.rubrik.com) Guidepoint Security (www.guidepointsecurity.com) In this episode of The Professional CISO Show, David Malicoat hosts a special two-part discussion live from GPSEC STL in St. Louis. First up is Marc Ashworth, CISO of First Bank and host of The Cyber Executive Podcast, who discusses leadership development, AI, mentor…
…
continue reading

1
You Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning. Frank and Dustin unpack: 🧠 Deepfake threats to democracy 🔐 Signal messaging & nation-state exploitation 🧪 Data poisoni…
…
continue reading

1
🎙 Episode 77 – CISO XC DFW 4: Securing the Real World
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14🔹 Live from CISO XC DFW (www.cisoxc.com) | Sponsored by Valence Security (www.valencesecurity.com) In this field-recorded episode of The Professional CISO Show, host David Malicoat returns to CISO XC DFW for another round of dynamic, on-the-ground conversations with three influential cybersecurity leaders — each offering a unique and grounded persp…
…
continue reading

1
Fix Your Data Pipeline or Drown: David Young on Cost, Complexity & AI in Security
20:00
20:00
Play later
Play later
Lists
Like
Liked
20:00Sponsors: ObservoAI (www.observo.ai) Guidepoint Security (www.guidepointsecurity.com) In this episode of The Professional CISO Show, recorded live at GuidePoint Security’s GPSEC STL event, host David Malicoat sits down with David Young, Chief Revenue Officer at ObservoAI. Together, they unpack the explosive growth of security data, the hidden costs…
…
continue reading

1
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, …
…
continue reading

1
Secure AF SOC Brief #5 - Chrome CVE-2025-6554
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations…
…
continue reading

1
🎙 Episode 75 — GPSEC STL: Community, AI & Quantum Readiness
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07Sponsors: AIM Security (www.aim.security) Guidepoint Security (www.guidepointsecurity.com) In this special on-location episode, David Malicoat returns to The Professional CISO Show from the heart of the St. Louis cybersecurity scene—GPSEC STL—presented by GuidePoint Security and AIM Security. He’s joined by two standout guests: 🔹 Andrew Wilder, CIS…
…
continue reading

1
Ep 91: The Engineers React to Breach News
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do t…
…
continue reading
Got a question or comment? Message us here! In this episode of The SOC Brief, Andrew and Dax dive into the world of false positives – those misleading alerts that flood security teams with noise. They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning to…
…
continue reading

1
✈️ EP74: Inside GPSEC STL: AI, Red Team Ops & Human-Centered Security
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02Sponsors: Rubrik (www.rubrik.com) Guidepoint Security (www.guidepointsecurity.com) In this live GPSEC St. Louis episode of The Professional CISO Show, host David Malicoat dives deep into cybersecurity leadership with two powerhouse guests: Victor Wieczorek, SVP of Offensive Security at GuidePoint Security, and Wayne Fajerski, Deputy CISO of Edward …
…
continue reading

1
AI Can Write a Better Phishing Email Than You. Here’s Why That Should Terrify You
57:17
57:17
Play later
Play later
Lists
Like
Liked
57:17Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity. From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting an…
…
continue reading

1
Techno, Timeline, and Training Truths
1:06:03
1:06:03
Play later
Play later
Lists
Like
Liked
1:06:03Send us a text We kick off this episode with highlights from the Techno Security Conference, our 80s-themed outfits, packed LEAPP labs, AI panel discussions, and great conversations with friends and colleagues across the field. We discuss Brett Shavers’ recent series on DFIR entry-level work, and share our thoughts on the need for better forensic t…
…
continue reading

1
Well-Being Interventions For Forensic Practitioners – Have Your Say
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04Dr Jo Morrissey joins Paul to discuss her research into wellbeing challenges faced by forensic practitioners worldwide. As Workforce Strategy Lead at the Forensic Capability Network, Dr Morrissey is conducting a comprehensive study examining mental health impacts across all forensic disciplines - from digital forensics to crime scene investigation,…
…
continue reading
Got a question or comment? Message us here! 🔐 New SOC Brief Episode: Tracing the Breadcrumbs Cybercriminals always leave a trail, if you know where to look. In this episode, we break down Indicators of Compromise (IOCs) and how they help security teams detect and respond to threats faster. 🎯 What we cover: • Real-world incident reports & proof of c…
…
continue reading

1
🔒 EP 73 — CISO XC DFW Part 3: From Threat Exposure to Business Enablement (ft. Matt Walker & Allen Rountree)
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Sponsors: HivePro (www.hivepro.com) CISO XC: (www.cisoxc.com) In this on-site episode from CISO XC DFW, David Malicoat sits down with Matt Walker (Goosehead Insurance) and Allen Rountree (IBM Public Cloud) for candid conversations on today’s biggest challenges and opportunities in cybersecurity leadership. 💡 Topics Covered Applying Zero Trust princ…
…
continue reading