Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in iTunes
Paul's Security Weekly TV
2017
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Category: enterprise security weekly, technical segment
Aug 19, 2017

In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network and Threat Intelligence. Check out the discussion in this segment!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode57

Visit http://securityweekly.com/esw for all the latest episodes!

Aug 5, 2017

John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode55

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 22, 2017

Where do the lines blur between monitoring, configuration, and vulnerability management? What is the best way to monitor systems in an enterprise? How to you manage machine to machine trust? Answers to all those questions and more in this segment!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode54

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 13, 2017

If you are a security professional who has not taken the plunge into Docker, this segment is for you. Paul highlights some of the configuration options available for Docket containers and how you can apply them to both your operating system and application hardening strategies.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode53 (Including sample Docker files discussed in this segment)

Visit http://securityweekly.com/esw for all the latest episodes!

1