Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in Apple Podcasts
Paul's Security Weekly TV
2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: August, 2017
Aug 31, 2017

In the startup and security notes of interest, 3 Cybersecurity Stocks to Buy Now. All that and more on this episode of Startup Security Weekly!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode52

Visit http://securityweekly.com/category/ssw for all the latest episodes!

Aug 30, 2017

Paul and Michael reiterate the message that Startup Security Weekly is about: innovation, business, and success in security. They explain the need to “de-risk risk” and how to differentiate the difference between a startup, investor, or enterprise security leader.

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode52

Visit http://securityweekly.com/category/ssw for all the latest episodes!

Aug 29, 2017

Sparring government agencies, Microsoft patches a patch of a patch, Intel chips and backdoors, SMS authentication begone, and more. Jason Wood of Paladin Security discusses scaling back data demand on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode138 Visit http://hacknaked.tv to get all the latest episodes!

Aug 29, 2017

Larry had a technical problem that he needed to solve. Larry demonstrates a new capture-the-flag scenario. Larry explains how to capture a particular wireless packet in the middle of all this noise.

Full Show Notes: https://wiki.securityweekly.com/Episode527

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Aug 28, 2017

More Celebrity Nude Photos Hacked and Leaked Online, A Company Offers $500,000 For Secure Messaging Apps Zero-Day Exploits, Beware of Windows/MacOS/Linux Virus Spreading Through Facebook Messenger, Open AWS S3 Bucket Leaked Hotel Booking Service Data, 98% of Companies Favor Integrating Security with DevOps, and a Racist Television company?

Full Show Notes: https://wiki.securityweekly.com/Episode527

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Aug 27, 2017

Richard Moulds is the General Manager of Whitewood Security. Whitewood aims to help its customers to take control of the generation of random numbers across their application infrastructure.

Full Show Notes: https://wiki.securityweekly.com/Episode527

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Aug 26, 2017

Diving deep into threat intelligence, GeoGuard and Skyhook team up, securing mobile devices, and more enterprise news!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode58

Visit http://securityweekly.com/esw for all the latest episodes!

Aug 26, 2017

John and Paul talk about low-hanging fruit, but try to determine if the enterprise is more secure because of your consulting on developer awareness. They help the enterprising company determine whether they need security training or not.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode58

Visit http://securityweekly.com/esw for all the latest episodes!

Aug 25, 2017

Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode58

Visit http://securityweekly.com/esw for all the latest episodes!

Aug 24, 2017

How much your startup needs to raise, 6 steps to surviving 3 years, documenting failures, and updates from Dragos, Zingbox, and more startup news!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode51

Visit http://securityweekly.com/category/ssw/for all the latest episodes!

Aug 23, 2017

Tarah Wheeler, entrepreneur and hacker extraordinaire, joins us to discuss her startup journey, some of the issues facing the security industry, and more!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode51

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Aug 22, 2017

Zero-days in PDF readers, updates to Debain Stretch, killer robots are coming, and more. Jason Wood of Paladin Security discusses sexually charged sonar-based attacks on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode137 Visit http://hacknaked.tv to get all the latest episodes!

Aug 22, 2017

More Chrome extensions have been compromised, disabling safety features in cars, being targeted via AirDrop, USB is less secure (go figure), and more security news!

Full Show Notes: https://wiki.securityweekly.com/Episode526

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Aug 21, 2017

Your WAF is not safe! Sven Morgenroth, a Security Researcher at Netsparker, blows Paul’s mind with his ninja-esque input filter bypass skills in this technical segment!

Full Show Notes: https://wiki.securityweekly.com/Episode526

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Aug 20, 2017

Bryson Bort is the Founder and CEO of GRIMM, a Washington, D.C. based security engineering and consulting services company. Bryson delves in-depth into his entrepreneurship journey, the problems GRIMM aims to solve, and the current state of pen testing, malware analysis, and more!

Full Show Notes: https://wiki.securityweekly.com/Episode526

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Aug 19, 2017

In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network and Threat Intelligence. Check out the discussion in this segment!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode57

Visit http://securityweekly.com/esw for all the latest episodes!

Aug 19, 2017

Security in the public cloud, the pitfalls of formal education, advanced security for AWS, and more enterprise news!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode57

Visit http://securityweekly.com/esw for all the latest episodes!

Aug 18, 2017

Mike Nichols, Director of Products at Endgame, joins us to discuss EDR, threat detection, and customer relations!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode57

Visit http://securityweekly.com/esw for all the latest episodes!

Aug 17, 2017

How not to botch your pitch, why VCs love insurance, ten ways to preserve cash as a bootstrapped startup, and updates from OpenText, WatchGuard, and more!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode50

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Aug 16, 2017

Matt joins Paul to recap the startups that caught their attention at the recent Black Hat conference in Las Vegas!

Startup Companies:

- Skyport Systems

- IntSights

- Capsule8

- Zingbox

- RiskSense

- ZeroFox

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode50

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Aug 15, 2017

Allowing terrible passwords, four arrested in Game of Thrones leak, using EternalBlue to attack hotel guests, and more. Don Pezet of ITProTV joins us to deliver expert commentary on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode136

Visit http://hacknaked.tv to get all the latest episodes!

Aug 15, 2017

Mystery bug bounties, Marcus Hutchins pleads not guilty, a password guru regrets past advice, Dropbox and offline two-factor authentication, and more security news!

Full Show Notes: https://wiki.securityweekly.com/Episode525

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Aug 14, 2017

Printer attacks have been around for some time. Paul describes some of the latest techniques and research into printer hacking, including capturing print jobs, manipulating print jobs and other attacks. These are useful on penetration tests (believe it or not). Defenders take note, printers must be on your radar.

Full Show Notes: https://wiki.securityweekly.com/Episode525

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Aug 13, 2017

Aram is the Founder and CEO of BeSafe (formerly Skycryptor), an encrypted cloud company that uses proxy re-encryption techniques to protect user data. He provides a demo on his techniques to ensure user data security!

Full Show Notes: https://wiki.securityweekly.com/Episode525

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Aug 10, 2017

Paul and John talk about Security Policies and Procedures. They discuss the most fundamental parts of policies and procedures. It is the most difficult to implement, but the most important to structure of the enterprise.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode56

Visit http://securityweekly.com/esw for all the latest episodes!

1 2 Next »