InfoSec 公开
[search 0]
更多

Download the App!

show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Loading …
show series
 
https://therecord.media/using-vms-to-hide-ransomware-attacks-is-becoming-more-popular/ https://blog.erratasec.com/2021/07/ransomware-quis-custodiet-ipsos-custodes.html?m=1 https://www.databreachtoday.com/how-mespinoza-ransomware-group-hits-targets-a-17086 https://krebsonsecurity.com/2021/07/dont-wanna-pay-ransom-gangs-test-your-backups/ https://ars…
 
In episode 66, Matt Danner joins the show to talk about digital forensics. My 3 main takeaways were 1) How to perform a forensics investigation against Google Storage 2) What the limitations of the Google Drive API are and 3) How to approach iOS and Android devices in an investigation. For more information, including the show notes check out: https…
 
In episode 65, I talk with Dr. Martina Dove about the psychology behind fraud, persuasion and scam techniques. My 3 main takeaways were 1) What makes some people more susceptible to fraud 2) the techniques scammers use to convince us to take certain actions and 3) What influence factor is the most powerful For more information, including the show n…
 
https://www.csoonline.com/article/3623760/printnightmare-vulnerability-explained-exploits-patches-and-workarounds.html#tk.rss_all https://www.securityweek.com/continuous-updates-everything-you-need-know-about-kaseya-ransomware-attack https://www.databreachtoday.com/kaseya-raced-to-patch-before-ransomware-disaster-a-17006…
 
In episode 64, Daniel Cuthbert joins us to talk about the OWASP Application Security Verification Standard. My 3 main takeaways were 1) Why the ASVS will make you a better pen tester and even bounty hunter 2) How to use the ASVS for threat modelling and 3) His tips on getting your talk accepted at a security conference For more information, includi…
 
This week, Nick Thomas and Leyla Gulen are joined by Mr. Kevin Cedeno, Cybersecurity Consultant for VIKTech and President, Huntsville Chapter of ISACA. News Stories Of The Week Include: REVIL Ransomware, Print Spooler Nightmare, Startup Threat Intelligence, Cyber Literacy Act, and more! The post InfoSecSync Weekly News 2 July 2021 appeared first on…
 
In episode 63, I talk with Nico Dekens, a.k.a Dutch_Osintguy about the dangers of relying on one search engine, Telegram OpSec, browser extensions & more. My 3 main takeaways were 1) When specific search engines will give you better results than others 2) How Telegram can be a better OSINT source than Tor and 3) Search techniques for finding the ri…
 
This week we welcome new team member and news anchor, Leyla Gulen. Leyla joins us from Fox 24 Charleston. She is the Host and Executive Producer for FOX 24 News Now Midday and FOX 24 News Now at 11pm. This week’s news articles focuses on: Revil Ransomware, John McAfee, Tax-Deductible Ransomware, Mercedes Breach, and more! The post InfoSecSync Weekl…
 
This week we welcome new team member and news anchor, Leyla Gulen. Leyla joins us from Fox 24 Charleston. She is the Host and Executive Producer for FOX 24 News Now Midday and FOX 24 News Now at 11pm. This week news articles focuses on: Revil Ransomware, John McAfee, Tax-Deductible Ransomware, Mercedes Breach, and more!…
 
https://www.reuters.com/technology/us-sec-official-says-agency-has-begun-probe-cyber-breach-by-solarwinds-2021-06-21/ https://www.databreachtoday.com/cisa-firewall-rules-could-have-blunted-solarwinds-malware-a-16919 https://www.wired.com/story/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told/ https://www.bleepingcomputer.com/news/securit…
 
In episode 62, Alissa Knight, the author of Hacking Connected Cars, joins us to talk about hacking connected cars, APIs, defense as well as vulnerability management. My 3 main takeaways were 1) Where to even begin with car hacking 2) The challenges car manufacturers have when trying to defend against these attacks and 3) How APIs are shaping the fu…
 
In episode 61, Robert Graham, the creator of masscan, joins us to talk about running internet wide port scanning the right way. My 3 main takeaways were 1) How to use the banner function correctly 2) How to figure out the fastest rate you can send packets and 3) The most common mistakes Rob sees when folks run masscan For more information, includin…
 
Today we're joined by John Gates, a Lead IT Security Operations Analyst for a global food brand. John has always liked to know how do things work - and that has proven to be a beneficial trait - from his first job as a car mechanic to IT consultancy and education to his current role. He’s also an advisor and former board member at OpsecEdu, an orga…
 
In episode 60, we chat with AJ Yawn about AWS security, compliance in the cloud, choosing an auditor and more. My 3 main takeaways were 1) How to make compliance not suck 2) How to automate security within an AWS environment and 3) What shared responsibility means when managing cloud infrastructure For more information, including the show notes che…
 
In this podcast, Heather speaks with two of Hurricane Labs' Splunkers about machine learning's potential when paired with Splunk. Related articles: Exploratory Data Analysis for Anomaly Detection – Splunk Blogs Cyclical Statistical Forecasts and Anomalies – Splunk Blogs Welcome to the Machine Learning Toolkit – Splunk Docs Machine Learning Crash Co…
 
In episode 59, Tim Adams joins us this week to talk DNS security, Zero Trust, TLD filtering and more. My 3 main takeaways were 1) How to integrate DNS Response Policy Zones, or RPZs, to prevent access to known bad domains 2) How aged a domain should be, sort of like wine, before trusting it and 3) DNS Tunneling, how to identify it and stop it For m…
 
Today we're joined by Samantha Cowan. Sam is currently the Head of Compliance at HackerOne. She's the former Director of Compliance at OneLogin and former Security Engineer at CoverHound, Cyber Policy, and Zenefits. Sam initially perceived Infosec as an "unhappy job", but later found herself taking her MBA and paving her way into the security indus…
 
Ben Dowling hangs out this week to talk about IP Geolocation. My 3 main takeaways were 1) how they determine where an IP address is actually located 2) how they deal with massive amounts of crowdsourced geodata 3) how they attribute IP addresses to specific companies For more information, including the show notes check out: https://breachsense.io/p…
 
In this podcast, Heather chats with members of Hurricane Labs' team about navigating security and IoT devices. Also, make sure to check out some of the resources mentioned during this episode: CloudFree – Smart Home Devices Home Assistant – Open Source Home Automation California Passes Law That Bans Default Passwords in Connected Devices – TechCrun…
 
In episode 56, Assaf Dahan joins us to talk about ransomware, monetization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, i…
 
In this podcast, Heather talks with two of Hurricane Labs' pentesters about how they approach attacking a network and an application. If you're looking to get started with pentesting–or want to improve your skills–participating in CTFs is a great way to do that. Check out Roxy's informational blog-video combination to get a head start on setting up…
 
In episode 56, Assaf Dahan joins us to talk about ransomware, monetization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, i…
 
Loading …

快速参考指南

Google login Twitter login Classic login