Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Health & Fitness
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/07/c5/27/07c527a1-cdd9-f055-099b-38d20011bed9/mza_1330698605734886324.jpg/600x600bb.jpg
InfoSec Deep Dive
Kostas
8 episodes
6 days ago
InfoSec DeepDive simplifies information security, turning complex topics into digestible discussions. Powered by NoteBookLM, episodes are scripted from curated sources and notes to deliver accurate, insightful content. Join AI hosts Bob and Alice as they tackle challenges, solutions, and innovations in InfoSec. With practical insights and clear takeaways, this podcast is perfect for staying sharp without jargon overload.
Show more...
Education
RSS
All content for InfoSec Deep Dive is the property of Kostas and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
InfoSec DeepDive simplifies information security, turning complex topics into digestible discussions. Powered by NoteBookLM, episodes are scripted from curated sources and notes to deliver accurate, insightful content. Join AI hosts Bob and Alice as they tackle challenges, solutions, and innovations in InfoSec. With practical insights and clear takeaways, this podcast is perfect for staying sharp without jargon overload.
Show more...
Education
Episodes (8/8)
InfoSec Deep Dive
Attacker’s Mistakes and Proactive Defense

Attackers rely on defense evasion to stay hidden, but mistakes eventually expose them. In this episode, we analyze areal-world intrusion, break down attacker psychology, and discuss how defenders can proactively detect threats before they achieve their goals. Join us for a deep dive into attacker slip-ups and effective security strategies!


Show more...
8 months ago
20 minutes 40 seconds

InfoSec Deep Dive
Incident Response: Behind the Scenes

Explore the field of incident response with our hosts as they discuss what it means to be an incident responder. From preparation to recovery, they cover the phases of handling security incidents and the approach needed to remain effective under pressure. Using real-world examples like ransomware attacks, they talk about the challenges, tools, and teamwork involved in reducing impact and learning from each event. This episode provides insight into the essential role of incident responders. Whether you want to know about the tools they use, the choices they make, or their daily tasks, this episode has you covered. Join us to understand why cybersecurity matters for everyone.

Show more...
9 months ago
16 minutes 59 seconds

InfoSec Deep Dive
Mastering Malware Analysis: Tools, Techniques, and Insights

In this episode, Bob and Alice take you on an educational journey through malware analysis. They break down key techniques like static and dynamic analysis, memory forensics, and reverse engineering while also addressing advanced challenges such as rootkit detection and anti-analysis techniques. Learn how malware operates, the tools used to dissect it, and the critical skills every analyst needs to stay ahead.

Show more...
9 months ago
33 minutes 4 seconds

InfoSec Deep Dive
Detection Engineering: Process, Challenges, and Careers

In this episode, Alice and Bob dive into the world of detection engineering, breaking down what it means and why it’s crucial in cybersecurity. Exploring the detection engineering process, the challenges of creating effective detections, and how automation and behavioral analytics are reshaping the field. Plus, we’ll discuss how detection engineering intersects with threat hunting and offer practical advice for anyone looking to get started in this area of InfoSec.


Sources Referenced:

  • Detection Engineering vs. Threat Hunting | Medium
  • Detection Engineering Overview | Splunk
  • Detection Engineering Case Study | GitGuardian
  • How to Become a Detection Engineer | Let's Defend
  • About Detection Engineering | Medium
Show more...
9 months ago
32 minutes 14 seconds

InfoSec Deep Dive
Proactive Defense: The Art of Threat Hunting

In this episode, Bob and Alice dive into the world of threat hunting, uncovering what it means to take a proactive approach against cyber threats. They explore the day-to-day life of a threat hunter, the step-by-step methodologies used to track hidden adversaries, and the key metrics that measure success. From building hypotheses to emulating attacker techniques, this episode offers insights into the skills and mindset needed to master the hunt and stay ahead of evolving threats.


Sources Referenced:

  • Behind the Scenes: The Daily Grind of Threat Hunter | by Kostas | Medium
  • Threat Hunting Metrics: The Good, The Bad and The Ugly | by Kostas | Medium
  • Threat Hunting Series: Detection Engineering VS Threat Hunting | by Kostas | Detect FYI
  • Threat Hunting Series: The Basics | by Kostas | Medium
  • Threat Hunting Series: The Threat Hunting Process | by Kostas | InfoSec Write-ups
  • Threat Hunting Series: Using Threat Emulation for Threat Hunting | by Kostas | InfoSec Write-ups
  • Threat Hunting Series: What Makes a Good Threat Hunter | by Kostas | Medium
  • What Is Cyber Threat Hunting? Complete Guide | Exabeam


Show more...
9 months ago
20 minutes 11 seconds

InfoSec Deep Dive
Building and Maintaining Your InfoSec Career

Join Bob and Alice in this episode of InfoSec Deep Dive as they explore the exciting world of cybersecurity careers. From ethical hackers to forensic analysts, security engineers to GRC strategists, they break down diverse career paths and the skills you need to succeed.

Discover how to gain hands-on experience, overcome challenges like imposter syndrome, and stay ahead in this ever-evolving field. Packed with insights, resources, and practical advice, this episode is your roadmap to thriving in InfoSec!


Sources Referenced:

  • Cybersecurity Career Paths: Which One Is Right for You?
  • The DFIR Report Mentoring & Coaching Program
  • How To Get A Job In Infosec
  • 2024 in Review: Helping InfoSec Professionals Achieve Their Goals
  • How to Get a Job in Cybersecurity
  • Book: Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career
Show more...
10 months ago
29 minutes 6 seconds

InfoSec Deep Dive
Sigma - The Universal Threat Detection Language

Join Bob and Alice on the Sigma Podcast as they dive into the world of Sigma rules! Perfect for beginners and pros alike, they break down what Sigma is, why it’s essential and how it’s revolutionizing threat detection.


🔗Sigma Website: sigmahq.io

🔗Sigma Github:  https://github.com/SigmaHQ/sigma

Show more...
10 months ago
17 minutes 23 seconds

InfoSec Deep Dive
The EDR Telemetry Project

Are you confident in your EDR's visibility? This episode explores the EDR Telemetry Project's findings, highlighting critical gaps in telemetry coverage, particularly on Linux systems. We’ll discuss the project’s expansion to Linux, the challenges of diverse Linux environments, and key areas where EDR solutions often fall short, such as kernel-level monitoring, user activity, and service/scheduled task tracking. Discover how the project is pushing vendors to improve and how you can contribute to this effort!


🔗 Website: edr-telemetry.com

Show more...
10 months ago
17 minutes 34 seconds

InfoSec Deep Dive
InfoSec DeepDive simplifies information security, turning complex topics into digestible discussions. Powered by NoteBookLM, episodes are scripted from curated sources and notes to deliver accurate, insightful content. Join AI hosts Bob and Alice as they tackle challenges, solutions, and innovations in InfoSec. With practical insights and clear takeaways, this podcast is perfect for staying sharp without jargon overload.