Our good friends Mike Roderick and Adam Gordon, two of ITProTV’s many security ninjas, deliver a tech segment and demo on virtualization, TPM, VMware, and virtual desktop infrastructure (VDI) as they relate to endpoint security and business! Full Show Notes Subscribe to YouTube Channel
We welcome Sven Morgenroth back to the show! Sven currently works as a Security Researcher at Netsparker. He rejoins us to deliver a technical segment on content security policies and cross-site scripting! Full Show Notes Subscribe to YouTube Channel
Tim Medin from the SANS Institute delivers a technical segment on abusing Kerberos tickets and PowerShell Empire! Full Show Notes Subscribe to YouTube Channel
Mick Douglas is a SANS instructor and the Managing Partner for InfoSec Innovations. He joins us to demonstrate pausing potentially malicious executables in PowerShell! Full Show Notes Subscribe to YouTube Channel
Securing the cloud is all the rage these days. So many vendors are now offering services in this area, and rightfully so, as getting a handle on the security of SaaS applications is no small chore. When software isn’t hosted in your environment, how do you secure it? Matt and Paul tackle this issue in […]
Kyle Wilhoit is a Senior Security Researcher at DomainTools; he focuses on research DNS-related exploits, investigate current cyber threats, and exploration of attack origins and threat actors. Kyle joins us to discuss the merit and concept of pivoting off domain information! Discuss the concept and merit of pivoting off domain information Why pivot off domain […]
Larry had a technical problem that he needed to solve. Larry demonstrates a new capture-the-flag scenario and how to capture a particular wireless packet in the middle of all the noise! Full Show Notes Subscribe to YouTube Channel
Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network, and Threat Intelligence. Check out the discussion in this segment! Full Show Notes Visit http://secweekly2.wpengine.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly. Full Show Notes Visit http://secweekly2.wpengine.com/esw for all the latest […]