4.9 • 8.6K Ratings
🗓️ 15 January 2018
⏱️ 22 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Today, we're talking with Andrew. |
0:02.0 | I'm a digital forensics and incident response consultant. |
0:05.5 | Andrew works on a team that does incident response. |
0:07.9 | Once malware is detected on the network, |
0:09.8 | it's up to him to go in, study the malware, and remove it. |
0:13.3 | Andrew, do you like doing this kind of work? |
0:15.1 | I love it. It's wonderful. |
0:16.8 | It's very exciting work. |
0:20.1 | You know, there aren't many positions where you can be working on a client system |
0:27.7 | and I'm actually the threat actors on there at the same time as you |
0:31.5 | trying to move files around and you are trying to thwart them in a |
0:35.7 | in a toe-to-toe scenario. |
0:37.7 | It can be very exciting. |
0:39.7 | It can be very exciting. |
0:44.7 | This is Darknet Diaries. |
0:46.7 | True stories from the dark side of the Internet. |
0:49.7 | I'm Jack Recyder. |
0:58.7 | Support for this show comes from Draughta. |
1:01.7 | Far too often, security teams are tasked with manual evidence collection to become |
1:05.7 | compliant, dedicating hundreds of hours that could otherwise be automated. |
1:09.2 | And I'd like to think that you'd rather use your time for implementing privacy |
1:12.7 | and security programs. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.