How much your startup needs to raise, 6 steps to surviving 3 years, documenting failures, and updates from Dragos, Zingbox, and more startup news!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode51
Visit http://securityweekly.com/category/ssw/for all the latest episodes!
Tarah Wheeler, entrepreneur and hacker extraordinaire, joins us to discuss her startup journey, some of the issues facing the security industry, and more!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode51
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Zero-days in PDF readers, updates to Debain Stretch, killer robots are coming, and more. Jason Wood of Paladin Security discusses sexually charged sonar-based attacks on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode137 Visit http://hacknaked.tv to get all the latest episodes!
More Chrome extensions have been compromised, disabling safety features in cars, being targeted via AirDrop, USB is less secure (go figure), and more security news!
Full Show Notes: https://wiki.securityweekly.com/Episode526
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Your WAF is not safe! Sven Morgenroth, a Security Researcher at Netsparker, blows Paul’s mind with his ninja-esque input filter bypass skills in this technical segment!
Full Show Notes: https://wiki.securityweekly.com/Episode526
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Bryson Bort is the Founder and CEO of GRIMM, a Washington, D.C. based security engineering and consulting services company. Bryson delves in-depth into his entrepreneurship journey, the problems GRIMM aims to solve, and the current state of pen testing, malware analysis, and more!
Full Show Notes: https://wiki.securityweekly.com/Episode526
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network and Threat Intelligence. Check out the discussion in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Security in the public cloud, the pitfalls of formal education, advanced security for AWS, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Mike Nichols, Director of Products at Endgame, joins us to discuss EDR, threat detection, and customer relations!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
How not to botch your pitch, why VCs love insurance, ten ways to preserve cash as a bootstrapped startup, and updates from OpenText, WatchGuard, and more!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode50
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Matt joins Paul to recap the startups that caught their attention at the recent Black Hat conference in Las Vegas!
Startup Companies:
- Skyport Systems
- IntSights
- Capsule8
- Zingbox
- RiskSense
- ZeroFox
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode50
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Allowing terrible passwords, four arrested in Game of Thrones leak, using EternalBlue to attack hotel guests, and more. Don Pezet of ITProTV joins us to deliver expert commentary on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode136
Visit http://hacknaked.tv to get all the latest episodes!
Mystery bug bounties, Marcus Hutchins pleads not guilty, a password guru regrets past advice, Dropbox and offline two-factor authentication, and more security news!
Full Show Notes: https://wiki.securityweekly.com/Episode525
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Printer attacks have been around for some time. Paul describes some of the latest techniques and research into printer hacking, including capturing print jobs, manipulating print jobs and other attacks. These are useful on penetration tests (believe it or not). Defenders take note, printers must be on your radar.
Full Show Notes: https://wiki.securityweekly.com/Episode525
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Aram is the Founder and CEO of BeSafe (formerly Skycryptor), an encrypted cloud company that uses proxy re-encryption techniques to protect user data. He provides a demo on his techniques to ensure user data security!
Full Show Notes: https://wiki.securityweekly.com/Episode525
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website: http://securityweekly.com
Follow us on Twitter: @securityweekly
Paul and John talk about Security Policies and Procedures. They discuss the most fundamental parts of policies and procedures. It is the most difficult to implement, but the most important to structure of the enterprise.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode56
Visit http://securityweekly.com/esw for all the latest episodes!
Glenn Chisholm and Ben Johnson are CEO and CTO of Obsidian Security, an enterprise hybrid-cloud security startup. As former founding team members of Cylance and Carbon Black, Glenn and Ben have led multi-billion dollar organizations and delivering presentations all over the world. Hear their incredible journeys on this episode!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode49
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
HashiCorp Vault brings disaster recover to security secrets management, Oracle joins SafeLogic to develop FIPS module for OpenSSL security, and Cylance bringing enterprise security platform technology to home users.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode56
Visit http://securityweekly.com/esw for all the latest episodes!
How to keep your head without losing your heart, what aspiring founders need to know, supercharging sales, and how NOT to start a startup. Michael and Paul deliver updates from Callsign, Juvo, Awake Security, and more!
Full Show Notes: https://wiki.securityweekly.com/SSWEpisode49
Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Shame on Disney, shooting down customer drones, flaws in solar panels, Chrome extensions spreading adware, and more. Doug White of Roger Williams University joins us to discuss hacking back on this episode of Hack Naked News!
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode135
Visit http://hacknaked.tv to get all the latest episodes!
WannaCry's killswitch domain registrant is arrested, making infosec more inclusive, hacking 113-year-old subway signs, security standards for smart devices, and more security news!
Full Show Notes: https://wiki.securityweekly.com/Episode524
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
Larry and his intern, Galen Alderson, present a demo of their Vaportrail project! Galen shows us how to exfiltrate data from networks using broadcast FM radio and other inexpensive materials.
Full Show Notes: https://wiki.securityweekly.com/Episode524
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website: http://securityweekly.com
Follow us on Twitter: @securityweekly
Danny Miller, the Director of Product Marketing at Ericom Software, joins us to discuss how enterprises can protect themselves by utilizing isolated browsing and other techniques!
Full Show Notes: https://wiki.securityweekly.com/Episode524
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
http://securityweekly.com
Follow us on Twitter:
@securityweekly
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Ping Look serves as the Executive Advisor of security communications and awareness at Optiv. Ping joins us to discuss security awareness, business diversity, and more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!