Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in Apple Podcasts
Paul's Security Weekly TV
2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Page 7
Jul 18, 2017

Russians on PornHub, dirty songs on the radio, Windows security protocol vulnerabilities, tomato plant security, and more security news!

Full Show Notes: https://wiki.securityweekly.com/Episode522

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jul 17, 2017

This is a random technical segment on implementing random number generators in Linux. Don shows us the ins and outs of the entropy pool, the different between /dev/random and /dev/urandom, and some awesome hardware that can increase entropy.

Full Show Notes: https://wiki.securityweekly.com/Episode522

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Jul 16, 2017

Learn about "fileless" malware, threat actors, evading detection on the endpoint and more!

Joe Desimone is a Malware Researcher at Endgame. He focuses on tracking and countering APTs, reverse engineering malware, and developing novel techniques and tools to empower hunt teams.

Full Show Notes: https://wiki.securityweekly.com/Episode522

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jul 15, 2017

Ferruh Mavituna of Netsparker joins us to discuss CI level automated web security!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode53

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 14, 2017

Suffering breaches from ex-employees, Tanium announces threat response, the SANS Institute's incident response survey results, and is cybersecurity getting harder?

Full Show Notes: https://wiki.securityweekly.com/ES_Episode53

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 13, 2017

If you are a security professional who has not taken the plunge into Docker, this segment is for you. Paul highlights some of the configuration options available for Docket containers and how you can apply them to both your operating system and application hardening strategies.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode53 (Including sample Docker files discussed in this segment)

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 11, 2017

Solving artificial stupidity, Petya’s decryption key is released, sleeping with the enemy, burner laptops for DEF CON, and more. Jason Wood of Paladin Security joins us to discuss the FTC shutting down a loan application firm on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode132

Visit http://hacknaked.tv to get all the latest episodes!

Jul 11, 2017

Tim Helming joins us to talk about all things related to domains, including luxury domain abuses, the security value of the whois database and more!

Full Show Notes: https://wiki.securityweekly.com/Episode521

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jul 11, 2017

James Jardine is the CEO of Jardine Software and a former SANS Institute author and instructor. James possesses over 15 years of development and application security experience.

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode46

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jul 11, 2017

The hells of being a founder, killing projects before they kill you, intellectual property 101, and invisible unicorns. Michael and Paul give updates on Auth0, Upstream, Palo Alto Networks, Symantec, and more!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode46

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jul 10, 2017

Paul Ewing from Endgame talks about the different types of threat hunting (network, host and logs) and the pros and cons of each!

Full Show Notes: https://wiki.securityweekly.com/Episode521

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Jul 10, 2017

How to hire infosec professionals, patching automation code, hijacked Android devices, Bitdefender support for Mac, and more security news!

Full Show Notes: https://wiki.securityweekly.com/Episode521

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jul 7, 2017

Paul and Doug talk about the need for and the pitfalls of Egress Filtering in your enterprise network. And sweaty lawyers.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode52

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 6, 2017

Fortinet preps for a next-gen firewall, Samsung no longer males printers, beware of Cisco training, using the right switches, Kubernetes, requirements and testing, to update or not to update and more!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode52

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 4, 2017

Separating the hacked and the paranoid, remote Linux hacking, Petya goes postal at FedEx, today’s mainstream hacktivism tools, and why choosing Windows should get you fired!

Full Show Notes: https://wiki.securityweekly.com/Episode520

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jul 3, 2017

Guy came on the show and gave a live demo on how to become Domain Admin in an Active Directory environment, and keep those privileges for 20+ years. Guys shows us how to abuse service accounts to get yourself a golden ticket. Then shows how the Javelin Networks technology can be used to detect, prevent and monitor for this type of attack and the exposures inside Active Directory that hand over the keys, er tickets, to the kingdom.

Full Show Notes: https://wiki.securityweekly.com/Episode520

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

Jul 2, 2017

Moses returns to the show to discuss his background in technology and security (which is eerily similar to Paul's!). The crew then got into a deep discussion of the history of many different technologies (Solaris Firewalls, IDS, Java and more!). Moses talked at length about serialization bugs in both PHP and Java. Then we dove right into JavaScript. It was a nerdfest, not to be missed!

Full Show Notes: https://wiki.securityweekly.com/Episode520

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jul 1, 2017

Apollo Clark discusses the tools and techniques your team can use to manage, monitor and tune your enterprise AWS deployment.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode51

Visit http://securityweekly.com/esw for all the latest episodes!

Jul 1, 2017

Love it or hate it, Docker (and containers) are here to stay. Embrace change in this segment where Paul and Apollo discuss using Docker in the enterprise. We cover security considerations, deployment scenarios and much more!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode51

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 30, 2017

Microsoft buys another company, to patch (or not), the shift in the cybersecurity battleground, Carbon Black’s Petya assessment, and more enterprise news!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode51

Visit http://securityweekly.com/esw for all the latest episodes!

Jun 29, 2017

Why most startups fail, conference season tips, the question you need to ask before solving any problem, and when should you hit pause? Michael and Paul deliver updates from GreatHorn, Cybereason, Amazon, and more!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode45

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 28, 2017

DoD networks have been compromised, the Shadow Brokers continue their exploits, a Pennsylvania healthcare system gets hit with Petya, and more. Jason Wood of Paladin Security joins us to discuss nations' offensive technical strengths and defensive weaknesses on this episode of Hack Naked News!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode131

Visit http://hacknaked.tv to get all the latest episodes!

Jun 28, 2017

Fred Kneip is the Chief Executive Officer for CyberGRX. Fred has served in several senior management roles, and has worked as an investor with two later-stage private equity investment firms. Fred joins us to talk about his journey in this interview!

Full Show Notes: https://wiki.securityweekly.com/SSWEpisode45

Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Jun 27, 2017

Why Firefox is superior, spies in Mexico, WannaCry shuts down a car plant, Cisco patches critical vulnerabilities, hacking air-gapped networks, and more security news!

Full Show Notes: https://wiki.securityweekly.com/Episode519

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website:
http://securityweekly.com

Follow us on Twitter:
@securityweekly

Jun 26, 2017

Learn how to use Windows Event Logs to catch attackers in your network, including domain admin group enumeration and mimikatz attacks! Justin Henderson (@SecurityMapper) categorizes these techniques as "reverse attack analysis for detection" and shows us how to do it in this technical segment! References to Mark Baggett's work on freq.py are made as well (https://isc.sans.edu/forums/diary/Detecting+Random+Finding+Algorithmically+chosen+DNS+names+DGA/19893/)

Full Show Notes: https://wiki.securityweekly.com/Episode519

Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg

Security Weekly Website: http://securityweekly.com

Follow us on Twitter: @securityweekly

1 « Previous 4 5 6 7 8 9 10 Next » 38