Security Weekly Productions
API security , authorization , bounty hunter , broken access control , Cloud Security Tech , Container Security , cyber crime , cyber security awareness , cyber security training , DAST , data protection , Data Security , disaster recovery , DLP , dockerized , Doug White , endpoint detection/response , endpoint prevention , epp , ethical hacker , ethical hacking , exploits , file integrity monitoring , fim , hipaa , honey pots , How the Russians Hacked The Olympics , https://wiki.securityweekly.com/Episode575 , Incident Response and Forensics , Integrating Security into DevOps , intrusion detections , Jon Fredrickson , log analysis , mac osx , mfa , Microsegmentation , mitre attack framework , Mobile Application Assessment , netops , network forensics , Network Security Engineer , New Breed of Cyber Attacks , not compliance , Old Androids , Open Source Software , OpenShift In Action , PAcket Capture , Patch Management Struggles , Patching Intel Vulnerabilities In The Enterprise , pcap , penetration testing , PIM , Printer Hacking , privileged access , programmer , Programming Update & Discussion , ransomware , Raspberry PI Model B , reverse engineering , risk management , SAST , Satellite Phone Encryption , scanning , secure access , Secure Coding Practices , security education , Security Operations and Endpoint Protection , Security Policy , security services , securityeducation , sexy defense , Siemens , Snapshot-assisted Backups , SOAR Software , social engineering , Spam's Revival , spying , sql injection , startup podcast , Stock Data Breaches , surveillance , sw composition analysis , Sysmon DNS logging , Technology Governance , The 3 Ways of DevSecOps , the current state of privacy and software development , The Human Element of Application Security , Threat Hunting & AI Hunter , threat intelligence , ThreatStack , Tribe of Hackers , Ubuntu Linux , vendor risk , VPN Filter Malware Risk , VS GDPR , vulnerabilities , Vulnerability Reporting , WAFs , Weak Passwords , William Lin , Windows patches , Windows XP , Workload Identity , XSS Vulnerability , Zero Trust Segmentation , Zscalers
July 30, 2021
This week Dr. Doug talks: Patching, PetitPotam, Elon, Microsoft Defender, Ransomware rules, Meteor, and more, on this edition of the Security Weekly News Wrap up Show! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!
Full Episode Show Notes
PyPI Malware, PetitPotam Attack, NSA Device Guidance, & Meteor Wiper – Wrap Up
Hosts
Doug White – Professor at Roger Williams University
@dougwhitephd
Doug White is a Cybersecurity professor at Roger Williams University, the President of Secure Technology, and a Security Weekly network host.