本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Black Hills Information Security
YouTube video
BlueMonkey 4n6
YouTube video
Breaking Badness
Cellebrite
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
Check Point
Cyber Social Hub
YouTube video
Forensic 4cast
YouTube video
Hardly Adequate
Season 2, Ep. 18•Monday, April 15, 2024Welcome to Hardly a Week 14 2024! Come along and listen to the new things in cyber, and Desi chat about what it takes to get into cybersecurity in 2024 each week.Microsoft Defender for Endpoint auditing capabilities - //www.lousec.be/mde/microsoft-defender-for-endpoint-auditing-capabilities/Australia & New Zealand Cyber Update #15 - //cyberknow.substack.com/p/australia-and-new-zealand-cyber-update-bfc2024 Insider Risk Investigations Report - //www.dtexsyste...
Huntress
YouTube video
InfoSec_Bret
YouTube video
Insane Forensics
YouTube video
Jai Minton
YouTube video
John Hammond
YouTube video
Karsten Hahn at Malware Analysis For Hedgehogs
YouTube video
LaurieWired
YouTube video
LetsDefend
YouTube video
Magnet Forensics
YouTube video
YouTube video
The Magnet Forensics Grant Assistance Program can bolster your agency’s digital forensic capabilities. Our team provides comprehensive grant writing and research support, helping US law enforcement agencies navigate the complex process of securing funding. In this session, we’ll guide you through identifying suitable grants, crafting compelling narratives, and formulating plans for data collection and performance measurements. You’ll benefit from professionals with extensive experience in both l...
Insider threats continue to pose a major risk to organizations. Organizations spent an average of $15.38 million in 2021 to deal with insider threats — up 34% from the $11.45 million in 2020. The number of insider incidents has increased by a staggering 44.3% in a single year, from 2020 to 2021. Data theft is the leading insider threat activity. Forty-two percent of insider threat events involved intellectual property (IP) or data theft. Digital forensic examiners inevitably are needed for insid...
MSAB
YouTube video
MyDFIR
YouTube video
SalvationData
YouTube video
SANS Cyber Defense
YouTube video
YouTube video
YouTube video
YouTube video
The DFIR Report podcast
DFIR Discussions: From OneNote to RansomNote: An Ice Cold Intrusion - Part 2ReportsApr 15, 2024Share00:0021:37DFIR Discussions: From OneNote to RansomNote: An Ice Cold Intrusion - Part 2We discuss our latest report From OneNote to RansomNote: An Ice Cold Intrusion Host: @Kostastsale Analysts: @iiamaleks, @IrishD34TH, & @Miixxedup Special Guest: @techspence Feedback: //forms.office.com/r/LR9NsEWYye Report: //thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrus...