Kyle Wilhoit is a Senior Security Researcher at DomainTools; he focuses on research DNS-related exploits, investigate current cyber threats, and exploration of attack origins and threat actors. Kyle joins us to discuss the merit and concept of pivoting off domain information! Discuss the concept and merit of pivoting off domain information Why pivot off domain […]
Larry had a technical problem that he needed to solve. Larry demonstrates a new capture-the-flag scenario and how to capture a particular wireless packet in the middle of all the noise! Full Show Notes Subscribe to YouTube Channel
Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network, and Threat Intelligence. Check out the discussion in this segment! Full Show Notes Visit http://securityweekly.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly. Full Show Notes Visit http://securityweekly.com/esw for all the latest […]
Apollo Clark discusses the tools and techniques your team can use to manage, monitor and tune your enterprise AWS deployment. How to Manage AWS Cloud Resources The Triangle of Security Success states: “Every good sales pitch involves triangles facing up or down.” – Andy Sutcliffe Inventory Management Resources State Management Default, weak, reused passwords, shared […]
Paul Asadoorian 513, Episode 513, Guy Franco, hacking, Jack Daniels, Javelin Networks, joff thyer, paul asadoorian, Paul's Security Weekly, Roi Abutbul, security, security weekly, tech segment, Technical Segment
Roi Abutbul and Guy Franco of Javelin Networks explain how to protect your active directory and deceive attackers in this technical segment! Full Show Notes Subscribe to YouTube Channel Security Weekly Website Follow us on Twitter: @securityweekly http://traffic.libsyn.com/pauldotcom/Tech_Segment_Roi_Abutbul_and_Guy_Franco_Javelin_Networks_-_Pauls_Security_Weekly_513_converted.mp3
Public File Metadata Analysis with PowerMeta – It is very common for organizations to post files (docx, pdf, xlsx, etc.) to publicly available websites on the Internet. Often times these organizations have not taken the time to strip the metadata attached to these files. This leaves the potential for remote attackers to discover sensitive information […]
Paul Asadoorian Carlos Perez, computers, data, Episode 511, ethical hacking, Experts, hacker, hacking, information security, infosec, joff thyer, network security, Part 2, paul asadoorian, security, security weekly, Staying Secure at Hacker Conferences pt. 2, tech segment, Technical Segment
Back by popular demand, Paul drops more conference security knowledge in this technical segment! Show Notes Subscribe to YouTube Channel Security Weekly Website Follow us on Twitter: @securityweekly http://traffic.libsyn.com/pauldotcom/Pauls_Security_Weekly__511_-_Tech_Segment_Staying_Secure_at_Hacker_Conferences_Part_2_converted.mp3
Paul Asadoorian 510, data, Episode 510, ethical hacking, hacker, hacking, information security, infosec, Jack Daniels, Jeff Man, joff thyer, larry pesce, network security, paul asadoorian, Paul's Security Weekly, security, security news, security weekly, Staying Se, tech segment
Paul gives his top 10 tips on keeping your devices safe at hacker cons in this technical segment! Full Show Notes Subscribe to YouTube Channel Security Weekly Website Follow us on Twitter: @securityweekly http://traffic.libsyn.com/pauldotcom/Pauls_Security_Weekly__510_-_Tech_Segment_Staying_Secure_at_Hacker_Conferences_converted.mp3