Forgetting your Windows password, bidding farewell to SMS authentication, reviewing Black Hat USA 2017, Ubuntu Linux for Windows 10, and more. Jason Wood of Paladin Security joins us to discuss companies being breached due to misconfiguration on this episode of Hack Naked News! News Google wants you to bid farewell to SMS authentication – Google’s campaign to […]
About Paul Asadoorian
Posts by Paul Asadoorian:
ZeroFOX, Deep Instinct, Flashpoint, Symantec acquired Skycure for an undisclosed amount, RiskLens and Nok Nok Labs raised $8M series D. Startup Articles & Discussion Five questions brands need to answer to be customer first in the digital age ==> 3 Essential (And 1 Surprising) Components Of A Successful Sales Strategy ==> knowing who isn’t a fit is […]
This is a random technical segment on implementing random number generators in Linux. Don shows us the ins and outs of the entropy pool, the different between /dev/random and /dev/urandom, and some awesome hardware that can increase entropy. Full Show Notes Subscribe to YouTube Channel
Ronnie Feldman is the President & Creative Director of Learnings & Entertainments, a network of comedians musicians, and writers that builds creative content to improve employee engagement, communication and corporate education. Full Show NotesVisit http://securityweekly.com/category/ssw/ for all the latest episodes!
Russians on PornHub, dirty songs on the radio, Windows security protocol vulnerabilities, tomato plant security, and more security news! Paul’s Stories Amazons Prime Day Won Shopping on Tuesday Tomato-Plant Security Dial S for SQLi: Now skiddies can order web attacks via text message No big deal. You can defeat Kaspersky’s ATM antivirus with a really […]
Learn about “fileless” malware, threat actors, evading detection on the endpoint and more! Joe Desimone is a Malware Researcher at Endgame. He focuses on tracking and countering APTs, reverse engineering malware, and developing novel techniques and tools to empower hunt teams. Full Show Notes Subscribe to YouTube Channel
How do you perform incident response on systems in your environment at scale or when the system that needs to be analyzed is in a geographically different location than your analysts? What if you need to do this and have no real budget to work with to use commercial tools? The answer is Google Rapid […]
Ferruh Mavituna of Netsparker joins us to discuss CI level automated web security! Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Suffering breaches from ex-employees, Tanium announces threat response, the SANS Institute’s incident response survey results, and is cybersecurity getting harder? New OneLogin Study finds Businesses Knowingly Leave Themselves Vulnerable to Data Breaches from Former Employees Flexera & Microsoft Join Forces to Increase Software Supply Chain Transparency & Strengthen Customer Relationships Tanium Announces Threat Response: A […]
Paul Ewing from Endgame talks about the different types of threat hunting (network, host and logs) and the pros and cons of each! Full Show Notes Subscribe to YouTube Channel