Remove Analysis Remove Fractional CTO Remove Information Security Remove Nonprofit
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

But from my perspective, since I already had a background in and you know, building exploits, analyzing those things, I was big on you know, protocol analysis when it came to forensics, the the analysis workflow for doing forensics and investigations in general wasn't that much different. And so that's kind of my angst against that.