Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in iTunes
Paul's Security Weekly TV
2017
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Page 3
Jul 4, 2017

Separating the hacked and the paranoid, remote Linux hacking, Petya goes postal at FedEx, today’s mainstream hacktivism tools, and why choosing Windows should get you fired!

Full Show Notes: https://wiki.securityweekly.com/Episode520

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jul 3, 2017

Guy came on the show and gave a live demo on how to become Domain Admin in an Active Directory environment, and keep those privileges for 20+ years. Guys shows us how to abuse service accounts to get yourself a golden ticket. Then shows how the Javelin Networks technology can be used to detect, prevent and monitor for this type of attack and the exposures inside Active Directory that hand over the keys, er tickets, to the kingdom.

Full Show Notes: https://wiki.securityweekly.com/Episode520

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Jul 2, 2017

Moses returns to the show to discuss his background in technology and security (which is eerily similar to Paul's!). The crew then got into a deep discussion of the history of many different technologies (Solaris Firewalls, IDS, Java and more!). Moses talked at length about serialization bugs in both PHP and Java. Then we dove right into JavaScript. It was a nerdfest, not to be missed!

Full Show Notes: https://wiki.securityweekly.com/Episode520

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jul 1, 2017

Apollo Clark discusses the tools and techniques your team can use to manage, monitor and tune your enterprise AWS deployment.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode51

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 1, 2017

Love it or hate it, Docker (and containers) are here to stay. Embrace change in this segment where Paul and Apollo discuss using Docker in the enterprise. We cover security considerations, deployment scenarios and much more!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode51

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 30, 2017

Microsoft buys another company, to patch (or not), the shift in the cybersecurity battleground, Carbon Black’s Petya assessment, and more enterprise news!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode51

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 29, 2017

Why most startups fail, conference season tips, the question you need to ask before solving any problem, and when should you hit pause? Michael and Paul deliver updates from GreatHorn, Cybereason, Amazon, and more!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode45

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 28, 2017

DoD networks have been compromised, the Shadow Brokers continue their exploits, a Pennsylvania healthcare system gets hit with Petya, and more. Jason Wood of Paladin Security joins us to discuss nations' offensive technical strengths and defensive weaknesses on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode131

Visit http://hacknaked.tv to get all the latest episodes!

Jun 28, 2017

Fred Kneip is the Chief Executive Officer for CyberGRX. Fred has served in several senior management roles, and has worked as an investor with two later-stage private equity investment firms. Fred joins us to talk about his journey in this interview!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode45

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 27, 2017

Why Firefox is superior, spies in Mexico, WannaCry shuts down a car plant, Cisco patches critical vulnerabilities, hacking air-gapped networks, and more security news!

Full Show Notes: https://wiki.securityweekly.com/Episode519

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jun 26, 2017

Learn how to use Windows Event Logs to catch attackers in your network, including domain admin group enumeration and mimikatz attacks! Justin Henderson (@SecurityMapper) categorizes these techniques as "reverse attack analysis for detection" and shows us how to do it in this technical segment! References to Mark Baggett's work on freq.py are made as well (https://isc.sans.edu/forums/diary/Detecting+Random+Finding+Algorithmically+chosen+DNS+names+DGA/19893/)

Full Show Notes: https://wiki.securityweekly.com/Episode519

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Jun 25, 2017

Eric Conrad comes into the studio to talk about a groundbreaking new CTF aimed at the defenders and how to become a SANS instructor. A healthy dose of UNIX/Linux nerd talk and how to give effective presentations is included! Eric Conrad is a SANS Senior Instructor, author, and infosec consultant. He also serves as the CTO of Backshore Communications, a company focusing on hunt teaming, intrusion detection, incident handling, and penetration testing.

Full Show Notes: https://wiki.securityweekly.com/Episode519

Security Weekly Web Site: http://securityweekly.com

Follow us on Twitter: @securityweekly

Jun 24, 2017

Five ways to maximize your IT training, pocket-sized printing, 30 years of evasion techniques, Ixia teases advanced visibility solutions, and more enterprise security news!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode50

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 23, 2017

Brian Ventura is a SANS Instructor and infosec architect, while Ted Gary serves as the Product Marketing Manager at Tenable.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode50

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 22, 2017

Negotiation mistakes that are hurting your deals, hiring re-founders, and does VC fund differentiation really matter? Michael and Matt deliver updates from Hexadite, Amazon, Sqrrl, SafeBreach, and more!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode44

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 21, 2017

Tarun Desikan is the Co-Founder and CEO of Banyan, a container and microservices security company based in San Francisco. Tarun Joins Michael and Matt to discuss Containerization, biometrics, advice for startups, and more!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode44

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 20, 2017

Hacking military phone systems, IoT malware activity doubles, more WikiLeaks dumps, decade-old bugs, and more. Jason Wood of Paladin Security joins us to discuss the erosion of ISP privacy rules on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode130

Visit http://hacknaked.tv to get all the latest episodes!

Jun 20, 2017

One MILLION endpoints, WannaCry is linked to North Korea, IoT is broken (what's new?),inside a porn-pimping spam botnet, fixing Windows Defender, and more security news!

Full Show Notes: https://wiki.securityweekly.com/Episode518

Visit Our Website: https://securityweekly.com

Jun 19, 2017

Carrie Roberts of Black Hills Information Security joins us to show hot to use Burp and ProxyCannon to Prevent IP blacklisting while password spraying in this technical segment!

Full Show Notes: https://wiki.securityweekly.com/Episode518

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Jun 18, 2017

Trey Forgety is the Director of Government Affairs and Information Security Issues at the National Emergency Number Association. He worked with the White House to develop policy for a nationwide LTE network for public safety known as FirstNet. Trey joins us to discuss emergency response systems and the future of crisis communications in this interview!

Full Show Notes: https://wiki.securityweekly.com/Episode518

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: https://securityweekly.com

Follow us on Twitter: @securityweekly

Jun 17, 2017

Carbon Black releases Cb Response 6.1, what to ask yourself before committing to a cybersecurity vendor, Malwarebytes replaces antivirus with endpoint protection, and more enterprise security news!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode49

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 16, 2017

*Should EDR be installed on every system? Servers too? All clients?

*How important is the configuration of EDR?

*What should your goals be for defense: know malware? unknown malware? ransomware? or are these three different products?

*If you have a big name AV install, what should drive you to change it? e.g. Symantec or Mcafee...

*What are the most common threats missed by EDR?

*How much of a concern is: performance, scalability, manageability, and crashing the host OS?

*When should you consider running two, or more, EDR solutions on the same host? Or, do you run one flavor on some, and another flavor on another?

Full Show Notes: https://wiki.securityweekly.com/ES_Episode49

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 15, 2017

Fundraising updates from Yubikey, CybelAngel, Netskope, Illumio, Krypto.co, and more startup new and journey updates!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode43

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 14, 2017

Wall Street Journal Best-Selling Author Shares 6 Secrets to Starting Smart [Book Excerpt] - Note the role of emotion to get traction/results Why Entrepreneurs Need To Keep Their Business Focused - Focus is key. Focusing on the right things is essential, The 5 Steps of Successful Customer Journey Mapping, A Startup’s Guide to Protecting Trade Secrets - Bottle Breacher Uses Google to Hone Marketing Campaign - This is not just because Paul loves it, You need to know what your customers value - They do not define value in terms of features and advantages of products or services.

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode43


Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 13, 2017

How to delete an entire company, GameStop suffers a breach, Macs do get viruses, Docker released LinuxKit, and more. Jason Wood of Paladin Security joins us to discuss the military beefing up their cybersecurity reserve on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode129

Visit http://hacknaked.tv to get all the latest episodes!

1 « Previous 1 2 3 4 5 6 7 Next » 34