How do you perform incident response on systems in your environment at scale or when the system that needs to be analyzed is in a geographically different location than your analysts? What if you need to do this and have no real budget to work with to use commercial tools? The answer is Google Rapid […]
Fred Kneip is the Chief Executive Officer for CyberGRX. Fred has served in several senior management roles, and has worked as an investor with two later-stage private equity investment firms. Fred joins us to talk about his journey in this interview! Full Show Notes
Negotiation mistakes that are hurting your deals, hiring re-founders, and does VC fund differentiation really matter? Michael and Matt deliver updates from Hexadite, Amazon, Sqrrl, SafeBreach, and more! Full Show NotesVisit http://secweekly2.wpengine.com/category/ssw/ for all the latest episodes!
The power of an exploit, Carbon Black’s open letter to Cylance, Viavi Solutions introduces scalable RF monitoring for heterogeneous networks, and 13 AWS IAM best practices for security and compliance! Full Show Notes Visit http://secweekly2.wpengine.com/esw for all the latest episodes! http://traffic.libsyn.com/eswaudio/Exploit_Carbon_Black_and_IAM_Best_Practices_-_Enterprise_Security_Weekly_47_converted.mp3
Find out what the key to growth is, Bain Capital Ventures to fund ‘angel’ investors, Tanium raised $100M, and find out where Michael and Paul are in their startup journeys! Full Show Notes http://traffic.libsyn.com/sswaudio/Newss_-_Startup_Security_Weekly_41_converted.mp3
Gravityscan is keeping WordPress sites safe, WiFi to see through walls, Dodged a bullet and stepped in front of another one, Twitter Flaw Allowed You To Tweet From Any Account, and Latest Cb Defense UX Features Intuitive Design, Easy Access to Answers from Carbon Black! Full Show Notes http://traffic.libsyn.com/pauldotcom/Security_News2_-_Pauls_Security_Weekly_515_converted.mp3
Don Pezet has been working in the IT industry for over 18 years and training others for over 12 years. He is a certified trainer with many vendors, including Microsoft and Cisco. Tim Broom’s passion for everything technology-related and desire to provide others with the opportunity, led him to open ITPro.TV’s brick and mortar computer […]
Almog Ohayon from Javelin Networks gives a demo on how compromises happen and counteract them. Full Show Notes http://traffic.libsyn.com/pauldotcom/Tech_Segment_How_Compromise_Happens_Active_Directory_is_Vulnerable_-_Pauls_Security_Weekly_515_converted.mp3
Microsoft Exchange and Office365 are extremely popular products that organizations use for enterprise email. These services can be exploited by remote attackers to potentially gain access to Active Directory user credentials. In this Tradecraft Security Weekly episode Beau Bullock (@dafthack) demonstrates how to utilize MailSniper to enumerate internal domains, enumerate usernames, perform password spraying attacks, […]
How to come up with worthy startup ideas, why your explainer video matters, and what does “Minimum Viable Product” actually mean, anyway? Full Show NotesVisit http://secweekly2.wpengine.com/category/ssw/ for all the latest episodes!