Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
DFIR Podcasts
Forensic Fix is a podcast from MSAB that covers the latest news and trends in the field of Digital Forensics. The show features guests from the industry who share their insights, experiences, and advice on various topics related to Digital Forensics. The podcast covers a wide range of subjects, including mobile device forensics, welfare, industry news and more. Listeners can expect to hear about the latest tools and techniques used by Digital Forensic professionals, as well as how the field ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
Come join Lee Reiber as he discusses some digital forensic gold. Also the home for the Forensic Happy Hour with guests from the DFIR community.
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Full Metal Packet is the go-to podcast for security leaders who want the truth about what it takes to defend at scale. Hosted by Yegor and Alex, the founders of Windscribe (trusted by 90M+ people) and Control D, this show pulls back the curtain on how operators actually handle breach incidents, reduce noise, and prepare for the post-AI security world. Season 1 features CISOs, DFIR commanders, and security architects from SaaS, healthcare, government, and hospitality. Each episode dives into: ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
We take the digital forensics news of today and forecast the future long term impact to our industry, both positive and negative.
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
1
The Idaho Murders: From Behavioural Clues To AI's Role In Digital Forensics
56:34
56:34
Play later
Play later
Lists
Like
Liked
56:34Heather and Jared Barnhart return to the Forensic Focus Podcast for a wide-ranging conversation covering Cellebrite's growing Case-to-Closure Summit, behind-the-scenes insights from building one of the industry's toughest CTFs, and their digital forensic work on one of the most high-profile US murder cases in recent years. They share why the C2C Su…
…
continue reading
Steve Bunting's journey into digital forensics began with an internal affairs investigation. The evolution of digital forensics has been marked by significant changes in technology and security. Comprehensive evidence gathering is crucial in forensic investigations. Innovative approaches, such as analyzing absence of evidence, can yield valuable in…
…
continue reading
1
Holiday Scam Season: Spot It, Share It, Stop It
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41This week on Brutally Honest Security, host Eric Taylor flags a timely and critical risk: the surge in holiday-season scams. As festive shopping, deliveries, and goodwill ramp up, so do scams targeting unsuspecting shoppers, families, and well-meaning gift-givers. Topics covered: 🎯 The most common holiday scams - from fake retail sites and spoofed …
…
continue reading
1
From Pre-Law to FLARE: How Josh Stroschein Became Google's Malware Analyst
39:38
39:38
Play later
Play later
Lists
Like
Liked
39:38In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein — aka The Cyber Yeti — a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world. Josh shares his unconventional path through .NET development, credit card processing security, and academia before landi…
…
continue reading
1
Building Zero Trust Tools: Inside ThreatLocker with Product Manager Yuriy Tsibere
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Yuriy Tsibere, Product Manager at ThreatLocker, for a behind-the-scenes look at how security products actually get built. Yuriy's path to cybersecurity started in Ukraine, where he worked in telecom during sophisticated APT campaigns that lasted over a year. Now at ThreatL…
…
continue reading
1
Inside FTK Imager Pro: Vendor-Neutral Forensics, Smarter AI, And Exterro's Forensic Vision
1:07:38
1:07:38
Play later
Play later
Lists
Like
Liked
1:07:38Justin Tolman from Exterro joins the Forensic Focus Podcast to talk about the future of FTK and the role FTK Imager still plays in everyday casework. He explains why the original free version remains available, and what prompted the introduction of Imager Pro with added capabilities like BitLocker decryption and iOS collections. Justin also reflect…
…
continue reading
1
Cyber Insurance Explained: What Blue Teams Need to Know Before an Incident
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️ In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Andy Runyan from Yukon to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and b…
…
continue reading
Stephen Ormston has a diverse background in management and communications within the security domain. The Cyclops project focuses on the mental health and wellbeing of practitioners in cybercrime. EU funding plays a crucial role in facilitating international collaboration on security initiatives. Standardization in digital forensics can enhance eff…
…
continue reading
1
Building Forensics Tools That Last | Brian Carrier (Autopsy, Sleuth Kit)
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40Josh Mason and Wade Wells sit down with Brian Carrier, the creator of Sleuth Kit and Autopsy, two of the most widely used digital forensics tools in the world. They dig into how Brian got his start in the early days of computer forensics, how open source shaped his career, and what he’s building now with Cyber Triage. From stories about government …
…
continue reading
1
Balancing Education and Real-World Cybersecurity with a SOC Analyst Student
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50In this episode of Simply Defensive, host Josh Mason and co-host discuss their experiences and challenges in cybersecurity, along with guest Victoria, a student and SOC analyst at UNLV. The conversation covers the complexities of building a Security Operations Center (SOC) and compares academic learning with real-world applications. Victoria shares…
…
continue reading
1
Data Breach, Massive Fine & Failed Response: Lessons from Capita
1:32:27
1:32:27
Play later
Play later
Lists
Like
Liked
1:32:27In Episode 4 of Brutally Honest Security, host Eric Taylor takes aim at one of the most revealing cyber-incidents of the year: the Information Commissioner’s Office’s £14 million penalty against Capita plc and subsidiary CPSL following a breach that exposed 6.6 million individuals and almost one terabyte of data. You’ll hear: • How an infected file…
…
continue reading
1
Brett Shavers Blogging Extravaganza!
1:14:24
1:14:24
Play later
Play later
Lists
Like
Liked
1:14:24Send us a text This episode digs into the habits that actually hold up: learning from CTF wins and post-event reviews, exploring scholarships and Reno trainings that build technical muscle, and walking through expert-witness prep that turns courtroom stress into structured, confident testimony. We’ll unpack Brett Shavers’ reminder that truth alone …
…
continue reading
1
Patch Tuesday Panic, Qilin’s Hybrid Strike & F5
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02Eric Taylor slices through the week’s noise in Brutally Honest Security — no spin, only sharp, actionable insight. This episode covers the crucial headlines every security pro should know: 🔧 Microsoft’s October Patch Tuesday: a record-scale release — 172 vulnerabilities patched, including multiple zero-days — and why patch prioritization matters no…
…
continue reading
1
Inside F3: Building Community And Sharing Knowledge In Digital Forensics
1:00:33
1:00:33
Play later
Play later
Lists
Like
Liked
1:00:33Gareth Davies, Chairman of F3 (First Forensic Forum), joins the Forensic Focus Podcast to explore how a grassroots, vendor-neutral community has helped shape digital forensics in the UK for three decades. He traces F3's origins in the 1990s, when affordable training and tool-agnostic knowledge-sharing were scarce, and explains why the forum still f…
…
continue reading
1
From Help Desk to SOC: How KevTech Broke Into Cybersecurity Without Certs
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40What happens when you go from fixing executives’ laptops at Goldman Sachs to defending against cyber threats in a SOC? In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Kevin Apolinario — better known as KevTech — to unpack his journey from IT support to cybersecurity analyst, all without a single certification. Kev…
…
continue reading
In this episode, Adam Firman interviews Sonja Ryan, founder of the Carly Ryan Foundation, who shares her personal journey following the tragic loss of her daughter Carly to an online predator. Sonja discusses the foundation's mission to promote online safety for children, the introduction of Carly's Law in Australia, and the importance of education…
…
continue reading
1
Detection Engineering Tutorial: Cloud Security, Kubernetes Logging & SOC Career Path
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44In this episode of Simply Defensive, we sit down with JB, a Senior Cybersecurity Engineer working in detection engineering. JB shares his journey from SOC analyst to detection engineer, diving deep into the challenges of cloud-native security, Kubernetes logging, and building a sustainable career in cybersecurity. What We Cover: What detection engi…
…
continue reading
1
Hands-On Defense: Markus Schober on DFIR, Labs, and Building Better Blue Teamers
30:31
30:31
Play later
Play later
Lists
Like
Liked
30:31In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Markus Schober, founder of Blue Cape Security, to talk all things digital forensics, incident response (DFIR), and why hands-on training beats theory every time. We dig into: 🔹 The hidden value of building your own cyber range 🔹 How IR pros train using real attacks (and wh…
…
continue reading
Send us a text A baby camel, a high-speed chase, and a heartfelt tribute set the stage for a season opener that is equal parts human and hard-nosed. We pause to honor Mark Baker, mentor, officer, and friend. This episode spotlights a free Belkasoft AI course along with the much-anticipated release of Rabbit Hole v3, designed to tackle complex data …
…
continue reading
1
Full Metal Packet: The Missing Conversations in Cybersecurity
0:42
0:42
Play later
Play later
Lists
Like
Liked
0:42When a breach hits, the first 72 hours decide everything. But the stories, decisions, and philosophies behind those critical hours rarely make it into public conversation. That’s what Full Metal Packet is here to change. Hosted by Yegor and Alex - the founders of Control D (and before that, Windscribe, now trusted by 90M+ people) - this podcast is …
…
continue reading
1
Inside The Fight Against Child Exploitation – Leadership And Wellness Lessons From Debbie Garner
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30Debbie Garner, retired Special Agent in Charge at the Georgia Bureau of Investigation, joins the Forensic Focus Podcast to share insights from her 30-year career. From undercover narcotics work in her early 20s to leading Georgia's Internet Crimes Against Children (ICAC) Task Force, Debbie brings a unique perspective on collaboration, child protect…
…
continue reading
1
CSRMC, LockBit 5.0 & Phishing Fallout
2:33:09
2:33:09
Play later
Play later
Lists
Like
Liked
2:33:09In this episode of Brutally Honest Security, Eric Taylor tears into the week’s most critical and pulse-raising cybersecurity developments — no fluff, just facts and blunt insight. Episode Headlines & Links: 👉 How the newly rebranded Department of War is replacing legacy frameworks with its Cybersecurity Risk Management Construct (CSRMC) - shifting …
…
continue reading
1
AsyncRAT, FileFix & Airport Shutdowns
2:25:01
2:25:01
Play later
Play later
Lists
Like
Liked
2:25:01When it comes to cybersecurity, sugarcoating is not an option. Brutally Honest Security cuts through the noise with raw, unfiltered insights from Eric Taylor — a seasoned digital forensics and incident response (DFIR) expert known for his “no-holds-barred” style. Each episode dives straight into the heart of information security: 🔥 Ransomware updat…
…
continue reading
1
Episode 24: Voice AI Under Attack: Hackers Exploit AI Call Agents | Traffic Light Protocol Podcast
55:27
55:27
Play later
Play later
Lists
Like
Liked
55:27Send us a text Voice AI is moving fast — but so are the attackers. In this episode of the Traffic Light Protocol Podcast, Clint and Myles break down how scammers are exploiting Voice AI platforms with the same tricks that wrecked email and telecom decades ago: Premium-rate fraud dressed up in AI clothing Bot-driven spam that floods calendars and bu…
…
continue reading
1
Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50From Army recon missions to building Morado, COO Jordan Kalm reveals how military intelligence tactics translate into modern cyber threat intelligence. In this Simply Defensive episode, Josh Mason and Wade Wells dive into what really works for blue teams and SOC analysts — and what’s just noise. 👉 If you’ve ever wondered how to turn raw intel into …
…
continue reading
1
How a Detective Became the Ginger Hacker: SOC Life, Job Hunts & Blue Team Wisdom
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
…
continue reading
1
Episode 23:AI Voice Agent Security: Voice AI Under Siege: SIP Spoofing, Cost Drain, and How to Fight Back
34:25
34:25
Play later
Play later
Lists
Like
Liked
34:25Send us a text In this episode of Traffic Light Protocol, we kick off our AI series with a hard look at how voice AI agents are being targeted; and how fast small businesses and startups can rack up serious bills overnight. Guest Myles Agnew returns to unpack how old-school telecom tricks are being repurposed in the age of SIP/VoIP and AI: caller I…
…
continue reading
1
Automating the Blue Team | Kevin Mata (Swimlane) on SOAR & AI in Cybersecurity
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI. Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams s…
…
continue reading
Send us a text We celebrate our two-year podcast anniversary and discuss the importance of thorough case preparation for CSAM cases, courtroom experience, and extracting evidence from iOS devices. • SANS Difference Maker Awards open for nominations through September 15th across multiple categories • AI debate webinar with Magnet Forensics scheduled…
…
continue reading
1
Inside Hack Defender Academy: Gamified Malware Training for Blue Teamers
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Ready to level up your defensive cybersecurity skills? In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Dan Regalado and Belem — the founders of Hack Defender Academy — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders. 💡 We cover: Why gami…
…
continue reading
1
Rob Allen (ThreatLocker) on Zero Trust, Proactive Security, and Ransomware Prevention
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention. Rob shares expert insights on: Proactive vs. Reactive cybersecurity — why a balanced security s…
…
continue reading
1
Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03Hannah Bailey, founder of Blue Light Wellbeing, joins the Forensic Focus Podcast to share her powerful journey from frontline policing to becoming a psychotherapist, trauma therapist, and well-being coach. Drawing on 15 years in the police — including CID and major crime — Hannah brings unique cultural credibility to her work supporting digital for…
…
continue reading
1
Why Your CISO Needs a “Shut Up, Boss” Button
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09What if GitHub sucks for security detections—and AI is finally good enough to replace it? Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks. Aaron doesn’t hold back. From ranting about…
…
continue reading
1
From Cryptic Apps to Clickable Maps: Making Sense of Digital Evidence
1:16:20
1:16:20
Play later
Play later
Lists
Like
Liked
1:16:20Send us a text We're back! After a short break we are back to discuss the growing crossover between real-world events and digital evidence in court cases, highlighting how device data can make or break timelines in high-stakes investigations. This episode covers: Ian Whiffin’s latest forensic work, including iOS power log timestamps, Apple Health d…
…
continue reading
1
Why Jack in the Box Might Have the Best Security Team in Fast Food
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of Simply Defensive, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals. Chris shares his journey from Windows NT and dot-matrix printer…
…
continue reading
1
Digital Forensics And Stress: Understanding Your Body's Signals
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45Dr Zoe Billings and Mark Pannone from Adapt & Evolve join Paul to discuss their unique approach to mental health and well-being in digital forensics. Dr Billings is a biologist and former senior investigator, while Mark is a former Assistant Chief Constable. Together they've developed a model that focuses on recognising the early biological signs o…
…
continue reading
Takeaways Mental health support is crucial for law enforcement professionals. Proactive approaches can prevent severe mental health issues. Stigmas around mental health often prevent individuals from seeking help. Therapy has evolved and can be more solution-focused today. You don't need a diagnosis to seek therapy. Recognizing signs of burnout is …
…
continue reading
1
Coffee Is Your Top Supply Chain Risk: A Conversation with Kyle Kelly
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos. We cover: - Why malicious packages are sneaking past defenders - The truth abo…
…
continue reading
1
Techno, Timeline, and Training Truths
1:06:03
1:06:03
Play later
Play later
Lists
Like
Liked
1:06:03Send us a text We kick off this episode with highlights from the Techno Security Conference, our 80s-themed outfits, packed LEAPP labs, AI panel discussions, and great conversations with friends and colleagues across the field. We discuss Brett Shavers’ recent series on DFIR entry-level work, and share our thoughts on the need for better forensic t…
…
continue reading
1
Well-Being Interventions For Forensic Practitioners – Have Your Say
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04Dr Jo Morrissey joins Paul to discuss her research into wellbeing challenges faced by forensic practitioners worldwide. As Workforce Strategy Lead at the Forensic Capability Network, Dr Morrissey is conducting a comprehensive study examining mental health impacts across all forensic disciplines - from digital forensics to crime scene investigation,…
…
continue reading
1
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01Host Paul Gullon-Scott sits down with Tom Oldroyd, Director of Strategy and Sales at Semantics 21, to discuss S21's digital forensics platform that prioritizes investigator mental health alongside cutting-edge technology. Drawing on his 17 years in policing and experience running a digital forensic unit, Tom highlights the psychological toll on inv…
…
continue reading
1
Episode 22:AI Chat Forensics: How to Find, Investigate, and Analyse Evidence from ChatGPT, Claude & Gemini
41:48
41:48
Play later
Play later
Lists
Like
Liked
41:48Send us a text Unlock the secrets behind digital forensic investigations into AI chat platforms like ChatGPT, Claude, and Google's Gemini in this insightful episode. Learn the precise methods for discovering, extracting, and interpreting digital evidence across Windows, Mac, and Linux environments, whether it's browser caches, memory forensics, net…
…
continue reading
1
Episode 21: How IRCO is Changing DFIR: The AI Copilot for Real-Time Cyber Investigations
15:48
15:48
Play later
Play later
Lists
Like
Liked
15:48Send us a text Link to IRCO- Incident Response Copilot on Chat GPT https://chatgpt.com/g/g-68033ce1b26481919b26df0737241bac-irco-incident-response-co-pilot In this episode of TLP: The Digital Forensics Podcast, Clint dives deep into IRCO (a custom GPT designed specifically for DFIR and SOC analysts). From real-world cyber incidents to post-incident…
…
continue reading
1
Episode 20:What Makes an Elite Incident Response Team: Mindset, Mastery, and Real-World DFIR Lessons
39:10
39:10
Play later
Play later
Lists
Like
Liked
39:10Send us a text Drawing inspiration from observing military special forces and over five years of hands-on DFIR experience, Clint explores the mindset, habits, and tactical processes that set top-performing IR teams apart. Clint Marsden explores the mindset, habits, and tactical processes that set top-performing IR teams apart. From threat intellige…
…
continue reading
1
S3 E8: Innovations in Cybersecurity: A Conversation with Threat Locker's John Liliston
27:21
27:21
Play later
Play later
Lists
Like
Liked
27:21In the final episode of Season 3 on Simply Defensive, hosts Josh Mason and Wade Wells welcome John Liliston, the Product Director at ThreatLocker. John shares his journey into cybersecurity, his role at ThreatLocker, and his thoughts on the evolution of security solutions. He discusses ThreatLocker's approach to zero trust, the impact of AI on cybe…
…
continue reading
Matteo Epifani has a rich background in digital forensics and education. The field of digital forensics has evolved significantly over the years. Timing is crucial in data preservation and extraction. Standards in digital forensics often lag behind technological advancements. Cross-validation with multiple tools is essential for accurate forensic a…
…
continue reading
1
Episode 19: AI Data Poisoning: How Bad Actors Corrupt Machine Learning Systems for Under $60
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16Send us a text Clint Marsden breaks down a critical cybersecurity report from intelligence agencies including the CSA, NSA, and FBI about the growing threat of AI data poisoning. Learn how malicious actors can hijack AI systems for as little as $60, turning machine learning models against their intended purpose by corrupting training data. Clint ex…
…
continue reading
1
S3 E7: Cybersecurity Chat with Chuck Sapp | From Military Service to Cyber Awareness
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community. Gain insights into his military background, his passion for educating othe…
…
continue reading
1
Every Breath You Take, Every Swipe You Make—Your iPhone’s Logging It
1:15:09
1:15:09
Play later
Play later
Lists
Like
Liked
1:15:09Send us a text Apple devices are constantly recording user activity, yet few forensic examiners are making use of the vast amount of data these systems quietly generate. Apple's Unified Logs and Spotlight databases track nearly everything that happens on an iOS device, often without the user realizing it. Would you believe an iPhone can generate ar…
…
continue reading
1
Hexordia's Jessica Hyde: Navigating The Future Of Digital Forensics
58:26
58:26
Play later
Play later
Lists
Like
Liked
58:26Jessica Hyde from Hexordia joins the Forensic Focus Podcast to discuss her unique journey from Marine Corps avionics technician to digital forensics expert. Jessica shares how her military background provided transferable skills for forensic investigations, emphasizing the importance of documentation, troubleshooting, and diverse perspectives in fi…
…
continue reading