Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in iTunes
Paul's Security Weekly TV
2017
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Page 4
Jun 13, 2017

• FBI Arrests NSA Contractor for Leaking Secrets
• getsploit: Search & Download Exploits!
• Some non-lessons from WannaCry
• IDG Contributor Network: Top 5 InfoSec concerns for 2017
• VMware Patches Critical Vulnerabilities in vSphere Data
• Protection OneLogin Security Chief Reveals New Details Of Data Breach
• Authentication Bypass, Potential Backdoors Plague Old WiMAX Routers
• Linux Malware Enslaves Raspberry Pi To Mine Cryptocurrency
• Internet Cameras Have Hard-Coded Passwords You Can't Change
• Will Deception as a Defense Become Mainstream?
• How a few yellow dots burned the Intercepts NSA leaker
• TV Hack Sparks Middle East's Diplomatic Crisis
• 53 Percent of Enterprise Flash Installs are Outdated
• Healthcare Industry Cybersecurity Task Force report

Full Show Notes: https://wiki.securityweekly.com/Episode517

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jun 12, 2017

byt3bl33d3r recently released "DeathStar", which use Powershell Empire's API to automatically obtain Domain Admin privileges in an Active Directory environment with the Click of a button. Some may ask "How do i detect and prevent this attack?". Tune in to this segment to find out how to use products available from Javelin Networks to do just that!

Full Show Notes: https://wiki.securityweekly.com/Episode517

Subscribe to YouTube Channel: https://www.youtube.com/securityweekly

Security Weekly Website: https://securityweekly.com

Follow us on Twitter: @securityweekly

Jun 12, 2017

Graham Cluley is an award-winning security blogger, researcher and public speaker. In this interview, we discuss ransomware, stealing content, the motivations of attackers, IoT, and more!

Graham has been a well-known figure in the computer security industry since the early 1990s when he worked as a programmer, writing the first ever version of Dr. Solomon's Anti-Virus Toolkit for windows. Since then, he has been employed in senior roles by companies such as Sophos and Mcafee, and now runs his own security news website and podcast.

Full Show Notes: https://wiki.securityweekly.com/Episode517

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jun 10, 2017

What should we consider while building an internal penetration testing team? Would you still need external pen tests? Paul and John discuss the pros and cons!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode48

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 9, 2017

Automating all the things, Juniper Networks opens a software-defined security ecosystem, millions of devices are running out-of-date systems, DUO New Zealand and McAfee join forces, and more enterprise news!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode48

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 8, 2017

Why You Should Think Twice About Listening to Business Gurus (There's no one-size-fits-all approach to innovation), A tech investor analyzed his 5000 monthly emails and explained how startups can stand out, Don't Build a Startup, Build a Business, Can Google’s 20% time really work for your startup?, As a startup, friction is a killer. In Security Startup news: Honeywell launches $100 million venture fund, RiskRecon raised $12M Series A, CounterTack raised $20M Series D, 10 Big Takeaways From Mary Meeker's Widely-Read Internet Report.

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode42

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 7, 2017

Matt is the former VP of Strategy for Tenable where hew was responsible for developing strategies to enter new markets, develop new products and improve existing products, including the new Tenable.io platform. Prior to Tenable, he ran product strategy for RSA Archer architecting big data approaches to GRC and redefining messaging.

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode42

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 6, 2017

Exploiting Windows 10, mimicking Twitter users, vulnerabilities in Subarus, security issues surrounding virtual personal assistants, and more. Jason Wood of Paladin Security joins us to discuss sniffing out spy tools with ridesharing cars on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode128

Visit http://hacknaked.tv to get all the latest episodes!

Jun 6, 2017

Chipotle and OneLogin suffer breaches, Windows XP Too Unstable To Spread WannaCry, Patches Available for Linux Sudo Vulnerability, Cisco, Netgear Readying Patches For Samba Vulnerability, oAuth nightmares, Attack and Defense, Jay Beale style, Decoding DECT with an RTL-SDR, and who are the Shadow Brokers?

Full Show Notes: https://wiki.securityweekly.com/Episode516

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jun 5, 2017

I know what you're thinking, Node.js is server-side right? Not exactly. It turns out many client-side applications have embedded Node.js. And its not always updated to the latest version. And, its vulnerable to attacks! Moses Hernandez is a Consulting Systems Engineer for Cisco Systems and an Instructor for pen testing courses at the SANS Institute. Moses shows us how to find Node.js on a system, locate the different versions, and exploit to bypass UAC!

Full Show Notes: https://wiki.securityweekly.com/Episode516

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Jun 4, 2017

Don Pezet from ITPro.TV joins us on the show to help us identify security challenges and solutions for small business/mid-market. Backups are key, as are ease of use and support. The most important thing? Awareness and education! Tune-in for the full discussion.

Full Show Notes: https://wiki.securityweekly.com/Episode516

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jun 3, 2017

The power of an exploit, Carbon Black's open letter to Cylance, Viavi Solutions Introduces Scalable RF Monitoring for Heterogeneous Networks, and 13 AWS IAM Best Practices for Security and Compliance!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode47

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 2, 2017

Containers are here to stay. While there is some resistance to this movement, Devops can help improve efficiency and security. For the first time security has a seat at the table when discussing the implementation of this new technology. Corey Bozdin comes on the show to discuss how we can use containers to improve security and how to scan your containers for vulnerabilities and exposures, including incorporating security into your SDLC.

Corey is currently responsible for coordinating the efforts of a global Product Management team, owning the product roadmap, and driving world-class execution of operational initiatives with Sales, Finance, and Support. He works closely with the Chief Product Officer to define, refine, and advance the Tenable product portfolio.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode47

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 1, 2017

Don Pezet has been working in the IT industry for over 18 years. In addition to working with the technologies, he has also been training others for over 12 years. He is a certified trainer with many vendors including Microsoft and Cisco. Tim Broom, as a I.T. career changer in 1999 studying for his MCSE NT 4.0., Tim’s passion for everything technology and desire to provide others the opportunity to make the same career conversion led him to open a brick and mortar computer learning center in Gainesville, FL.

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode41

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

May 31, 2017

Gravityscan is keeping WordPress sites safe, WiFi to see through walls, Dodged a bullet and stepped in front of another one, Twitter Flaw Allowed You To Tweet From Any Account, and Latest Cb Defense UX Features Intuitive Design, Easy Access to Answers from Carbon Black!


Full Show Notes: https://wiki.securityweekly.com/Episode515

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

May 31, 2017

Find out what the key to growth is, Bain Capital Ventures to fund 'angel' investors, Tanium raised $100M, and find out where Michael and Paul are in their startup journeys!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode41

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

May 30, 2017

Thousands of known bugs found in pacemaker code, Chipotle's sale terminals get hacked, Microsoft patches another critical malware protection engine flaw, popular Radius server expoitable with TLS session caching, and polite hackers hijacked this mall billboard. All that and more on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode127

Visit http://hacknaked.tv to get all the latest episodes!

May 30, 2017

Almog Ohayon from Javelin Networks gives a demo on how compromises happen and counteract them.

Full Show Notes: https://wiki.securityweekly.com/Episode515

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

May 28, 2017

Dr. Branden R. Williams has twenty years of experience in business, technology, and information security as a consultant, leader, and an executive. Branden has world for well known Information Security companies as well as founded two. He's an author, blogger, pilot, and lover of bourbon.

Full Show Notes: https://wiki.securityweekly.com/Episode515

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

May 27, 2017

Atif Ghauri is the CTO for Herjavec Group USA and comes on the show to talk about SEIM, EUBA and how to build a relationship with your MSSP! Atif has over 15 years of experience in technology strategy, implementation, and business development from Comcast, IBM and Unisys. Prior to Herjavec Group, he spent four years as the CISO for the advanced engineering group at Comcast.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode46

Visit http://securityweekly.com/esw for all the latest episodes!

May 26, 2017

Stopping insider threats with machine learning, the importance of inspecting encrypted traffic, performance and security relations, and what to do if you're SOC is overwhelmed with too many SEIM alerts.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode46

Visit http://securityweekly.com/esw for all the latest episodes!

May 25, 2017

How to come up with worthy startup ideas, why your explainer video matters, and what does “Minimum Viable Product” actually mean, anyway?

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode40

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

May 24, 2017

Paul and Michael give updates on their startup journeys and report on Karamba, Crowdstrike, Wandera, and more on this episode!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode40

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

May 23, 2017

Exploiting media players using subtitles, Netgear is recording your IP and MAC address, net neutrality is on the chopping block, Yahoobleed attack, and EternalRocks. Jason Wood of Paladin Security joins us to explain why companies should (or should not) hack back on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode126

Visit http://hacknaked.tv to get all the latest episodes!

May 23, 2017

WordPress announces a bug bounty program, stealing voice prints, hacking Mar-a-Lago, XP PCs dodge WannaCry’s ransom, and more security news!

Full Show Notes: https://wiki.securityweekly.com/Episode514

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

1 « Previous 1 2 3 4 5 6 7 Next » 34