John Strand delivers the Technical Segment this week on Office 365 User Behavior Analytics. The idea is if you have a user account simultaneously logged in to multiple computer systems, that may be abnormal. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Tag: paul asadoorian
Rick Holland has more than 15 years’ experience working in information security. Paul and John talk to Rick about vulnerability management, WAFs, and advice to enterprise marketing. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes! Hosts
Mike leads the Product Management, Product Marketing, UX, and Business Development efforts at DomainTools. He brings over 20 years of experience in the security industry, and has a real passion for building products that customers love and driving significant growth for the product lines he leads. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes! […]
Paul and Matt Alderman had the chance at DEF CON to sit down and talk about Cigars and Security. In our very first episode, Paul asks Matt questions on how he got started in Security, who some of his biggest influencers were, and how he feels about the Security world today. Matt asks Paul questions […]
Our very own Larry Pesce delivers the Technical Segment this week on Spoofing GPS with a hackRF. Full Show Notes Subscribe to YouTube Channel Hosts
Paul and Matt discuss all of the vendors providing attack simulation solutions, including why you want (or need) this type of solution, the problem(s) they solve, and differentiators. This is an exciting space, so exciting that Paul and Matt sweat A LOT as this was recorded live from our pool cabana in Las Vegas! Visit […]
Paul and Matt review the ICS security landscape, discussing the problems and potential solutions to secure critical infrastructure. We used several on-site interviews and briefings with solutions providers at Blackhat as a basis for this segment. Recorded live at the Security Weekly pool cabana in Las Vegas! Visit http://securityweekly.com/esw for all the latest episodes!
An introduction to FL2K: Software Defined Radio is all the rage for detecting unknown signals and transmitters. We’ll show you how to set up and use a surreptitious transmitter to start your journey. Full Show Notes Subscribe to YouTube Channel
Josh is a key member of the technical execution team. In this capacity, he is responsible for leading, directing, and executing client-facing engagements that include Praetorian’s tactical and strategic service offerings. Full Show Notes Subscribe to YouTube Channel
Jessica Rozhin is currently a Security Engineer at an Oakland Financial Tech startup called Marqeta. This is her first role in the security space, but she is no stranger to technical operations and incident response. Before Marqeta she spent several years working the the Network Operations Center at Box, focused on preventing, responding to and […]