Digital Forensic Survival Podcast
Technology
This week I’m talking about identity access controls commonly encountered in cloud environments. These come up during DFIR investigations and high-level awareness, at the least, is necessary for analysts in order to be effective during investigations. These are the things that may be part of root cause, part of the attack escalation, or part of mitigation will remediation. This week all cover the basics to help with your incident response preparedness.
DFSP # 432 - Control Bits
DFSP # 431 - Finding Needles
DFSP # 430 - Targeting Tasks
DFSP # 429 - Career Moves
DFSP # 428 - It’s all about that XML
DFSP # 427 - MOF Balls
DFSP # 426 - SSH Forensics: Log Analysis
DFSP # 425 - SSH Forensics: Host-Based Artifacts
DFSP # 424 - SSH Forensics: Understanding Secure Shell
DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle
DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro
DFSP # 421 - Memory Lane: Fileless Linux Attacks Unraveled
DFSP # 420 - Failing, Stopping and Crashing
DFSP # 419 - What the Flux
DFSP # 418 - Core Insights: Navigating MFT in Forensics
DFSP # 417 - Unlocking Linux Secrets
DFSP # 416 - Persistence Mechanisms on Windows
DFSP # 415 - Dealing with Third-Party Incidents
DFSP # 414 - CRON Forensics
DFSP # 413 - Ransomware Initial Response
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast