{"id":26,"date":"2025-01-21T19:38:27","date_gmt":"2025-01-21T19:38:27","guid":{"rendered":"https:\/\/mupages.marshall.edu\/sites\/joshbrunty\/?page_id=26"},"modified":"2025-01-21T19:41:59","modified_gmt":"2025-01-21T19:41:59","slug":"other","status":"publish","type":"page","link":"https:\/\/mupages.marshall.edu\/joshbrunty\/other\/","title":{"rendered":"Other"},"content":{"rendered":"\n<p>PRESS<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Is Antivirus Still Essential, <em>El Pas, <\/em>6.23.22 [<a href=\"https:\/\/english.elpais.com\/science-tech\/2022-06-24\/is-antivirus-software-still-essential.html\" target=\"_blank\" rel=\"noopener\">read<\/a>]<\/li>\n\n\n\n<li>Still paying for antivirus software? Experts say you probably don&#8217;t need it, <em>NBC News<\/em>, 12.1.21 [<a href=\"https:\/\/www.nbcnews.com\/tech\/security\/still-paying-antivirus-software-experts-say-probably-dont-need-rcna6335\" target=\"_blank\" rel=\"noopener\">read<\/a>]<\/li>\n\n\n\n<li>UA student spent night in jail over Facebook post that wasn&#8217;t hers. Arkansas Democrat Gazette, 4.1.19 [<a href=\"https:\/\/www.arkansasonline.com\/news\/2019\/apr\/01\/student-sees-perils-in-tracing-of-threa\/\" target=\"_blank\" rel=\"noopener\">read<\/a>]<\/li>\n\n\n\n<li>Credit Card Vulnerability Awareness Rises, <em>The Herald Dispatch<\/em>, 11.3.17 [<a href=\"https:\/\/www.herald-dispatch.com\/news\/credit-card-vulnerability-awareness-rises\/article_588b336d-609a-55bb-ba7a-889d314d0e18.html\" target=\"_blank\" rel=\"noopener\">read<\/a>]<\/li>\n<\/ol>\n\n\n\n<p>PODCASTS<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>ArcPoint Forensics <em>Unallocated Space<\/em> Podcast. S1, Ep9 [<a href=\"https:\/\/youtu.be\/zItjxXkhDwA\" target=\"_blank\" rel=\"noopener\">listen<\/a>]<\/li>\n\n\n\n<li>National Institute of Justice<em> Just Science<\/em> Podcast: Digital Forensics Program Development and Outlook [<a href=\"https:\/\/nij.ojp.gov\/library\/publications\/just-science-podcast-just-digital-forensics-program-development-and-outlook\" target=\"_blank\" rel=\"noopener\">listen<\/a>]<\/li>\n\n\n\n<li>Cellebrite <em>Life Has No Ctrl+Alt+Del<\/em> Podcast. DFIR Mentorship. 7.25.21 [<a href=\"https:\/\/cellebrite.com\/en\/dfir-mentorship-what-does-it-mean\/3\" target=\"_blank\" rel=\"noopener\">listen<\/a>]<\/li>\n\n\n\n<li><em>Forensic Focus Podcast<\/em>: Digital Forensics Education. 8.11.20 [<a href=\"https:\/\/www.forensicfocus.com\/podcast\/josh-brunty-on-digital-forensics-education\/\" target=\"_blank\" rel=\"noopener\">listen<\/a>]<\/li>\n\n\n\n<li>Oxygen Forensics Happy Hour Podcast. 7.17.20 [<a href=\"https:\/\/youtu.be\/SUJ2HaB6rnA\" target=\"_blank\" rel=\"noopener\">watch<\/a>]<\/li>\n\n\n\n<li>The Forensic Lunch Podcast. 5.8.20 [<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/forensic-lunch-5-8-20-jack-farley-josh-brunty-kevin\/id1035370378?i=1000474098289\" target=\"_blank\" rel=\"noopener\">listen<\/a>] [<a href=\"https:\/\/youtu.be\/fPzSm-hofA0\" target=\"_blank\" rel=\"noopener\">watch<\/a>]<\/li>\n\n\n\n<li><em>Nerds &amp; Nonsense<\/em> Podcast. S1, Ep. 3. 12.7.19 [<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/episode-3-peter-serefine-professor-josh-brunty-more\/id1480966055?i=1000459026073\" target=\"_blank\" rel=\"noopener\">listen<\/a>]<\/li>\n<\/ol>\n\n\n\n<p>BLOG POSTS<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>GitHub Blog [<a href=\"https:\/\/joshbrunty.github.io\" target=\"_blank\" rel=\"noopener\">read<\/a>]<\/li>\n\n\n\n<li>Writing DFIR Reports: A Primer. <em>Forensic Focus<\/em> [<a href=\"https:\/\/www.forensicfocus.com\/articles\/writing-dfir-reports-a-primer\/\" target=\"_blank\" rel=\"noopener\">read<\/a>]<\/li>\n<\/ol>\n\n\n\n<p>TALKS<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>PUP to PWN: Attack Vectors of Common Bloatware @ AIDE 2018 [<a href=\"https:\/\/youtu.be\/rgmN9OTDcng\" target=\"_blank\" rel=\"noopener\">watch<\/a>]<\/li>\n\n\n\n<li>PUP to PWN: Attack Vectors of Common Bloatware @ BSides Kansas City 2017 [<a href=\"https:\/\/youtu.be\/MT_UhU_Hwjg\" target=\"_blank\" rel=\"noopener\">watch<\/a>]<\/li>\n<\/ol>\n\n\n\n<p>TUTORIALS<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Introduction to Wireshark [<a href=\"https:\/\/youtu.be\/q7abUFatFA0\" target=\"_blank\" rel=\"noopener\">video tutorial<\/a>]<\/li>\n\n\n\n<li>Network Forensics Using Kali and SIFT [<a href=\"https:\/\/youtu.be\/yRyi_RxXd-M\" target=\"_blank\" rel=\"noopener\">video tutorial<\/a>]<\/li>\n<\/ol>\n\n\n\n<p>CODE<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>GitHub Repo [<a href=\"https:\/\/github.com\/joshbrunty\" target=\"_blank\" rel=\"noopener\">visit<\/a>]<\/li>\n<\/ol>\n\n\n\n<p>FUNDING<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>National Computer Forensics Institute\/United States Secret Service- R&amp;D ($755K), PI, 2020-present<\/li>\n\n\n\n<li>Department of Homeland Security S&amp;T ($2M), Co-PI, 2020-present<\/li>\n\n\n\n<li>Department of Homeland Security ($4.2M), Co-PI, 2019-present<\/li>\n\n\n\n<li>National Security Agency. GenCyber ($62K), PI, 2018<\/li>\n\n\n\n<li>INCO. Faculty Development Grant ($1.2K), PI, 2018<\/li>\n\n\n\n<li>National Security Agency. GenCyber ($50K), PI, 2017<\/li>\n\n\n\n<li>INCO. Faculty Development Grant ($1.2K), PI, 2017<\/li>\n\n\n\n<li>National Institute of Justice. Award 2010-IJ-CX-K025 ($855K), Co-PI, 2010-2015<\/li>\n\n\n\n<li>INCO. Faculty Development Grant ($1K), PI, 2014<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>PRESS PODCASTS BLOG POSTS TALKS TUTORIALS CODE FUNDING<\/p>\n","protected":false},"author":268,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/mupages.marshall.edu\/joshbrunty\/wp-json\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mupages.marshall.edu\/joshbrunty\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mupages.marshall.edu\/joshbrunty\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mupages.marshall.edu\/joshbrunty\/wp-json\/wp\/v2\/users\/268"}],"replies":[{"embeddable":true,"href":"https:\/\/mupages.marshall.edu\/joshbrunty\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":4,"href":"https:\/\/mupages.marshall.edu\/joshbrunty\/wp-json\/wp\/v2\/pages\/26\/revisions"}],"predecessor-version":[{"id":31,"href":"https:\/\/mupages.marshall.edu\/joshbrunty\/wp-json\/wp\/v2\/pages\/26\/revisions\/31"}],"wp:attachment":[{"href":"https:\/\/mupages.marshall.edu\/joshbrunty\/wp-json\/wp\/v2\/media?parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}