John gives a Technical Segment this week entitled “Building A Purple Team”. He talks about different MITRE Tools. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Paul delivers the Technical Segment this week entitled “Docker Security Incident: Lessons Learned”! Blog Post Full Show Notes Subscribe to YouTube Channel
This week in the Topic Segment, our very own Jeff Man gives us a recap on the 2018 RSA Conference! He discusses HackerOne CEO talking Bug Bounty programs, DevSecOps day at RSA demonstrates how the thinking around secure software has evolved, if it’s time to kill the Pen Test, and more! Full Show Notes Subscribe […]
Eyal is the Former Head of Israeli Air Force CERT & Forensics Team & currently the Senior Security Researcher at Javelin Networks. Eyal will describe and explain how AD Domain Trusts and Forest Trusts works, and how they can leverage by attackers to hop from one domain to another, after the compromise of the first […]
In the bad old days we used to exploit LSASS memory to dump hashed credentials from memory. When dealing with a domain controller, and a large environment this is dangerous. This segment will address a safer way to extract hashed credentials from the environment for subsequent download, and cracking. Full Show Notes Subscribe to YouTube […]
Security Weekly Productions 86, Doug White, Enterprise Security Weekly, paul asadoorian, Secure Digital Life, Security Threats from Virtual Machines, six security threats to virtual machines, tech segment, Topic
Doug White, host of Secure Digital Life, comes on the show to talk about five, no six security threats from virtual machines! Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
In this weeks Technical Segment, Paul delivers his segment entitled Cutting The Cord: The Ideal Home Network Setup. Paul and the crew discuss Nvidia Shield, Firewalls, Parental Control, and other nice devices to have in your home to make things easier! Full Show Notes Subscribe to YouTube Channel
John Strand is off the hook! John discusses what works for enterprises when it comes to attacks. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
This week, Paul and Keith talk about “The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win!” Full Show NotesVisit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.comsecurityweekly
Sven Morgenroth is a security researcher at Netsparker. He found filter bypasses for Chrome’s XSS auditor and several web application firewalls. Full Show Notes Slides for this Tech Segment Subscribe to YouTube Channel