Securing Your Future in DFIR
May 1st, 2020 | 🕒
iSpeech.org One of the most popular questions posed in the field of DFIR is, "how do I get into the
May 1st, 2020 | 🕒
iSpeech.org One of the most popular questions posed in the field of DFIR is, "how do I get into the
February 27th, 2020 | 🕒
iSpeech How many times have you thought about a more efficient, intuitive, or creative way to analyze the security events
February 26th, 2020 | 🕒
iSpeech This presentation is designed as a personal journey through threat hunting to inspire others to embrace certain methods, tips,
February 10th, 2020 | 🕒
iSpeech There are many reasons to write forensics tools, from making it open source, to being free from a vendor
November 7th, 2019 | 🕒
iSpeech 2020 CTI Summit: http://www.sans.org/u/XjA Summit: January 20-21 | Courses: January 22-27 The Cyber Threat Intelligence Summit & Training brings
October 7th, 2019 | 🕒
iSpeech Distributed Evidence Collection and Analysis with Velociraptor: Fast, Surgical, at Scale...and Free! Having the ability to rapidly collect and
August 27th, 2019 | 🕒
iSpeech.org As a continuation of the 13Cubed "Introduction to Windows Forensics" series, this episode covers a powerful image mounting tool
July 23rd, 2019 | 🕒
https://www.ispeech.org/text.to.speech The APT Group Goblin Panda (aka, Conimes and China 1937CN Team) is an active threat to government and diplomatic
July 16th, 2019 | 🕒
https://www.ispeech.org Many organizations have operationalized threat intelligence as part of a well-rounded security program, but we often struggle to show
June 7th, 2019 | 🕒
iSpeech Will you be the hunter or the prey? — Learn how to become an elite threat hunter. The two-day
May 30th, 2019 | 🕒
Text to Speech Privacy and security are often lumped together as one subject with similar objectives. But as many security
May 23rd, 2019 | 🕒
Free Text to Speech Cyber threat intelligence is built on a traditional intelligence framework. Often, information security focuses on scientific
May 9th, 2019 | 🕒
iSpeech.org Language serves as the required medium for every form of communication, whether it be via email, a phone call,
May 2nd, 2019 | 🕒
https://www.ispeech.org Discussions on threat intelligence often get bogged down between “machine speed” ingestion of atomic indicators and in-depth analysis of
Gloss