Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in Apple Podcasts
Paul's Security Weekly TV
2019
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Category: Paul's Security Weekly, Interview
Apr 15, 2019

Merissa Villalobos is the North America Talent Acquisition Leader for NCC Group, a global security consulting firm and has been recruiting in security for 10 years. She got her start in Virginia, at a Federal Government contractor, filling roles for the intelligence community and various Government Agencies. Jessica Gulick leads Katzcy Consulting, a growth hacker company that helps tech firms grow through strategy, market research, and digital marketing. With 20+ years in cybersecurity, she is a seasoned cybersecurity manager, marketer, consultant, and expert with a substantial network of technical and executive peers.

If anyone has questions, they can visit our website at https://womenscyberjutsu.org/ or reach out to me directly, I’m always happy to help!

Full Show Notes: https://wiki.securityweekly.com/Episode600

Follow us on Twitter: https://www.twitter.com/securityweekly

Apr 14, 2019

Gabriel Gumbs is the VP of Product Management at Spirion where his focus is on the strategy and technology propelling Spirion’s rapidly-growing security platform. A cybersecurity industry veteran with a 19 year tenure in CyberSecurity, he has spent much of that time as a security practitioner, aligning security innovations with business objectives for Fortune 100 organizations. Gabriel is an information security thought leader, privacy advocate and public speaker.

Full Show Notes: https://wiki.securityweekly.com/Episode600

Follow us on Twitter: https://www.twitter.com/securityweekly

Mar 30, 2019

This week, we welcome back Mary Beth Borgwing, President and Founder of of the Cyber Social Club, to talk about Uniting Women in Cyber!

Full Show Notes: https://wiki.securityweekly.com/Episode599

Follow us on Twitter: https://www.twitter.com/securityweekly

Mar 24, 2019

Marcus Carey is the Founder & CEO at Threatcare. Navy Cryptologist turned cybersecurity entrepreneur, Marcus Carey is Currently working as founder and CEO of cybersecurity company Threatcare. He joins us talk about the book that he Co-Authored, "Tribe of Hackers"!

Full Show Notes: https://wiki.securityweekly.com/Episode598

Follow us on Twitter: https://www.twitter.com/securityweekly

Mar 18, 2019

We interview Carsten Williams, Co-Founder and CEO at VMRay, discussing malware sandboxing! Carsten is the original developer of CWSandbox, a commercial malware analysis suite that was later renamed to GFI Sandbox, and now Threat Analyzer by ThreatTrack Security.

To learn more about VMRay, visit: https://securityweekly.com/vmray Full Show Notes: https://wiki.securityweekly.com/Episode597

Follow us on Twitter: https://www.twitter.com/securityweekly

Mar 3, 2019

David Marble is the President & CEO at OSHEAN. David joins us to talk about what to expect at at this years Rhode Island Cybersecurity Exchange Day! This conference will be held on March 13th 2019 from 9am to 3pm at Salve Regina University, w/ a featured keynote by our Founder and CTO, Paul Asadoorian!

Full Show Notes: https://wiki.securityweekly.com/Episode596

Follow us on Twitter: https://www.twitter.com/securityweekly

Mar 2, 2019

Allan Liska is the Senior Solutions Architect at Recorded Future. Allan talks about threat intelligence – no longer just for the secret squirrels among us. While the term can elicit reactions ranging from exasperated sigh to flashbacks of security buzzword bingo circa 2015, Recorded Future is delivering on the industry promise – actionable intelligence for all security pros.

Get Trending Threat Insights Delivered to Your Inbox, at: https://securityweekly.com/recordedfuture

Full Show Notes: https://wiki.securityweekly.com/Episode596

Follow us on Twitter: https://www.twitter.com/securityweekly

Feb 24, 2019

Steve Brown, Keynote Speaker at SecureWorld Boston 2019 to discuss his talk about Building Your Strategic Roadmap for the Next Wave of Digital Transformation!

Full Show Notes: https://wiki.securityweekly.com/Episode595

Follow us on Twitter: https://www.twitter.com/securityweekly

Feb 17, 2019

Harry Sverdlove, Chief Technology Officer of Edgewise for an interview, to talk about The Future of Firewalls!

To learn more about Edgewise, visit: https://www.securityweekly.com/edgewise

Full Show Notes: https://wiki.securityweekly.com/Episode594

Follow us on Twitter: https://www.twitter.com/securityweekly

Feb 12, 2019

Connie Mastovich is the Sr. Security Compliance Analyst at Reclamere and she will be speaking at InfoSec World 2019. Connie's talk will be about "The Dark Web 2.0: How It Is Evolving, and How Can We Protect Ourselves?" Connie teases her talk and explains how to protect ourselves, our clients, and the information that we handle daily.

Full Show Notes: https://wiki.securityweekly.com/Episode593

Follow us on Twitter: https://www.twitter.com/securityweekly

Feb 3, 2019

Benjamin Daniel Mussleris the Senior Security Researcher at Acunetix. Benjamin will come on the show to talk about Web App Scanning with authentication.

To learn more about Acunetix, visit: https://securityweekly.com/acunetix

Full Show Notes: https://wiki.securityweekly.com/Episode592

Follow us on Twitter: https://www.twitter.com/securityweekly

Jan 27, 2019

Christopher Morales is Head of Security Analytics at Vectra, where he advises and designs incident response and threat management programs for Fortune 500 enterprise clients. Christopher is a widely respected expert on cybersecurity issues and technologies and has researched, written and presented numerous information security architecture programs and processes.

Full Show Notes: https://wiki.securityweekly.com/Episode591

Follow us on Twitter: https://www.twitter.com/securityweekly

Jan 20, 2019

Dr. Eric Cole is the leading cybersecurity expert in the world, known as the go-to for major political and business power players.

Full Show Notes: https://wiki.securityweekly.com/Episode590

Follow us on Twitter: https://www.twitter.com/securityweekly

Jan 12, 2019

Bryson is the Founder and CEO of SCYTHE and Founder of GRIMM. He comes on the show to talk about Attack Simulation.

To learn more about SCYTHE.io, go to: https://www.scythe.io/securityweekly

Full Show Notes: https://wiki.securityweekly.com/Episode589

Follow us on Twitter: https://www.twitter.com/securityweekly

Jan 5, 2019

"Phoneboy" has been helping the security community for over 15 years. We fondly remember Phoneboy as a resource that helped us configure our Check Point firewalls back in the day! Phoneboy comes on the show to discuss how to help people in the security community, a topic near and dear to our hearts.

Full Show Notes: https://wiki.securityweekly.com/Episode588

Follow us on Twitter: https://www.twitter.com/securityweekly

Dec 24, 2018

Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. Instead, she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, sustainable, ethical neuro tech, and improving the lives and community of InfoSec professionals and Neurodiverse professionals. She enjoys art, requires loads of rest still, and hopes to be half the person her service dog, Trevor, is.

Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke

Full Show Notes: https://wiki.securityweekly.com/Episode587
Follow us on Twitter: https://www.twitter.com/securityweekly

Dec 16, 2018

Ed Skoudis, Founder of the Counter Hack Challenge and Kringle Con 2018, joins us on the show to talk about this years challenge and what's in store! "Welcome to Counter Hack Challenges, an organization devoted to creating educational, interactive challenges and competitions to help identify people with information security interest, potential, skills, and experience. We design and operate a variety of capture-the-flag and quiz-oriented challenges for the SANS Institute, Cyber Aces, US Cyber Challenge, and other organizations. Our featured products include NetWars, CyberCity, Holiday Hack Challenge, Cyber Aces Online, and several Cyber Quests."

Join KringleCon: www.kringlecon.com

Full Show Notes: https://wiki.securityweekly.com/Episode586

Follow us on Twitter: https://www.twitter.com/securityweekly

Dec 15, 2018

Don Murdoch is the Assistant Director at Regent University Cyber Range. Don discusses his book "Blue Team Handbook Incident Response Edition".

Full Show Notes: https://wiki.securityweekly.com/Episode586

Follow us on Twitter: https://www.twitter.com/securityweekly

Dec 2, 2018

Wietse Venema and Dan Farmer, the Developers of Security Administrator Tool for Analyzing Networks (SATAN), talk about their experience as developers, their journey to creating SATAN and their decision to keep SATAN a open source tool.

Full Show Notes: https://wiki.securityweekly.com/Episode584

Follow us on Twitter: https://www.twitter.com/securityweekly

Nov 17, 2018

Jon Buhagiar is responsible for Network Operations at Pittsburgh Technical College for the past 19 years. Jon is currently a Network+ Review Course Instructor at Sybex, and he joins us to talk about Network Operations at Sybex.

Full Show Notes: https://wiki.securityweekly.com/Episode583

Follow us on Twitter: https://www.twitter.com/securityweekly

Nov 11, 2018

Corin Imai is Sr. Security Advisor for DomainTools. Corin began her career working on desktop virtualization, networking, and cloud computing technologies before delving into security. This interview, they talk about DNS, phishing tools, and tease what DomainTools has in store for 2019.

Full Show Notes: https://wiki.securityweekly.com/Episode582

Follow us on Twitter: https://www.twitter.com/securityweekly

Oct 20, 2018

Mark Dufresne explains why MITRE created their tool and what the MITRE attack framework is.

Full Show Notes: https://wiki.securityweekly.com/Episode579

Follow us on Twitter: https://www.twitter.com/securityweekly

Oct 14, 2018

Lee Neely is a senior IT and security professional at LLNL with over 25 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions.

Full Show Notes: https://wiki.securityweekly.com/Episode578

Visit our website: http://securityweekly.com

Follow us on Twitter: https://www.twitter.com/securityweekly

Sep 29, 2018

Mike Nichols is the VP of Product Management at Endgame, and he manages the Endgame endpoint protection platform. Keith McCammon is the Chief Security Officer and Co-Founder of Red Canary, and he runs Red Canary’s Security Operation Center. Shawn Smith is the IT Security Manager at Panhandle Educators Federal Credit Union. They discuss the problems Shawn had that led him to choose Red Canary and Endgame as his solution, skill shortages in vendors, what he did to convince his management to approve of this solution, and what his process for testing the effectiveness of these solutions was.

Full Show Notes: https://wiki.securityweekly.com/Episode577

Visit https://www.securityweekly.com/psw for all the latest episodes! 

Sep 23, 2018

Mike Ahmadi oversees IoT security solutions and technical implementations for DigiCert customers across various verticals that include industrial, transportation, smart city, consumer devices and healthcare.

Full Show Notes: https://wiki.securityweekly.com/Episode576

Visit our website: http://securityweekly.com

Follow us on Twitter: https://www.twitter.com/securityweekly

1 2 3 4 Next »