InfoSec 공개
[search 0]

Download the App!

show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Loading …
show series
 
This week we change things up a bit and review a curated (almost) 5 minute summary of the latest InfoSec news including SolarWinds sanctions, language supply chain attacks, Egregor ransomware as a service, N.Korean crypto theft, vuln exploitation in the wild, Mexican politicians and ATM skimming, a new password manager, legal use of look-alike doma…
 
This episode provides an overview of the MITRE Shield Framework for Active Defense. Released in August 2020, Shield provides network defenders with opportunities to degrade and disrupt an adversary that has gained initial unauthorized access to a protected network. For more information on MITRE Shield, visit their website: https://shield.mitre.org/…
 
For our latest Humans of InfoSec podcast, we’re excited to welcome Phillip Wylie on the show. Phillip has over 22 years of experience with the last 8 years spent as a pentester. Phillip has a passion for mentoring and education. His passion motivated him to start teaching and founding The Pwn School Project a monthly educational meetup focusing on …
 
The Schrems II ruling and Brexit mean that UK organisations are required to reconsider the legal basis for the transfer of personal data to and from Europe.The webinar recording covers:The Schrems II decision regarding transfers of data;The implications for UK and EU data controllers regarding data transfers;The types of data transfers organisation…
 
Ramping up for The 2021 National Cyber Summit, Nick focuses on past interviews from Keynote Speakers and Cyber Security Experts such as: Retired Brigadier General Jennifer Buckner, Director of Cyber U.S. Army Rober Lee, CEO Dragos Inc. Shirley Zhao, Principal Program Manager, Blackberry These interviews give a peek into the vast information availab…
 
Pete and Scott kickoff their podcast series by stating their intent and laying the ground work for future episodes. DISCLAIMER: The opinions, statements, beliefs and viewpoints expressed by the participants on this podcast are those of each individual participant and do not represent that of their employer nor any company, organization or instituti…
 
This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies, NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passw…
 
On today’s show, Heather Terry chats with Steve McMaster, Brian Karrigan, Dusty Miller, and Austin O'Neil as they wrap up their discussion on designing a security operations center (SOC). In case you missed it, make sure to listen to Designing a SOC: Internal or External? Part 1. Click here for our podcast episode transcript.…
 
This week pdp hangs out to chat about PownJS, SecApps, recon tool orchestration and tool development. My 3 main takeaways were 1) how to integrate PownJS into your recon process 2) his recon workflow and 3) Why JavaScript is a great language for quick PoC development For more information, including the show notes check out https://breachsense.io/po…
 
This is hands down my favorite episode to date. I sit down and have a virtual happy hour with my entire team from Mandiant Security Validation. We have one of, if not the best teams I've ever been lucky enough to be apart of. This is easily our largest group to be interviewed...but we work so well together, you won't even notice ;) . The only rule …
 
Nick Thomas Interviews Mr. Jeremy Leasher, Security Solutions Architect at Axellio Inc. and his 21-year Army Career as a 255S Cyber Warrant Officer. We also discuss: Security Education & Training Axellio educating their customer base, Threat Hunting & Incident response, and more! The post InfoSecSync Podcast Episode ISS_038 appeared first on InfoSe…
 
This week Gabrielle Botbol joins the show to talk about getting into the world of pen testing, certs, CTFs, self study resources, report writing, repeatable risk scoring, finding XSS and staying current. My 3 main takeaways were 1) the CTFs you should be practicing on 2) some strategies to gain credibility in the industry and 3) which certs are wor…
 
The EU General Data Protection Regulation (GDPR) highlights how the principles of ‘privacy by design’ and ‘privacy by default’ are fundamental to ensuring that organisations protect the rights of data subjects.We take a look at Data Protection By Design And By Default Under The GDPR in this webinar recording…
 
This week Paulino Calderón joins the show to chat about his methodology for finding bugs in IoT devices, using Lua for quick exploit development, alarming vulnerabilities he found in a smart water bottle, extending Nmap's functionality and his tips for starting a security business. For more information, including the show notes check out https://br…
 
On today’s show, Heather Terry welcomes a few members of the Hurricane Labs’ team–Steve McMaster, Brian Karrigan, Dusty Miller, and Austin O'Neil–to discuss the steps that go into establishing a SOC team, and what you'll want to consider when deciding whether your team will be internal or whether you'll work with a Managed Security Services Provide…
 
This week Christian Folini hangs out to talk about protecting web apps with the OWASP Core Rule Set, getting into the security industry, impedance mismatch and anomaly scoring. My 3 main takeaways were 1) how RASPs compare to WAFs 2) how paranoia levels are used to eliminate false positives and 3) how the Swiss Post used the CRS to protect a vulner…
 
Betsy Bevilacqua is the current VP of Information Security at Chainalysis. Initially, she had her mind set on law school until she did a self-audit and realized that she enjoyed computers and tech much more. Her journey into infosec led her to move from Kenya to the US to obtain a degree in Security and explore various companies involved in academi…
 
This week we change things up a bit and review a curated (almost) 5 minute summary of the latest InfoSec news including SolarWinds sanctions, language supply chain attacks, Egregor ransomware as a service, N.Korean crypto theft, vuln exploitation in the wild, Mexican politicians and ATM skimming, a new password manager, legal use of look-alike doma…
 
In this podcast, Heather chats with Vulnerability Management Specialist Roxy and SOC Analyst Dusty about the security best practices concerns at play in the recent water plant breach. Related articles: Florida Water Plant Hack: Leaked Credentials Found in Breach Database Breached water plant employees used the same TeamViewer password and no firewa…
 
Despite the talent shortage, the barrier to entry in information security remains daunting. Yet Davin Jackson, a former flight mechanic turned senior penetration tester, learned to leverage his passion and tenacity to pursue and achieve his infosec goals. Now, Davin is invested in helping others in the field through accessible mentorship, teaching,…
 
Join me in this episode as I get to interview the "Chuck Norris" of infosec, Mr. Phillip Wylie himself! Be sure to grab a glass of Old Forester 1920, and Phillip's new book, "The Pentester Blueprint," for a fun chat where we talk about everything from learning to hack to ....wrestling a bear??
 
This week John Hammond joins the show to talk about hacking with Python, certs vs degrees, avoiding rabbit holes and the differences between various flavors of CTFs. My 3 main takeaways were 1) how to get started with capture the flag competitions 2) dealing with burnout and 3) his methodology to analyze malware For more information, including the …
 
This week Ted Harrington hangs out to talk about hacking passive medical devices, predicting Ethereum private keys and exploiting business logic flaws. My 3 main takeaways were 1) Ted's 6 fundamentals of security testing 2) How do to threat modelling right and 3) His advice for starting a security company For more information, including the show no…
 
Curious about the Collegiate Penetration Testing Competition (CPTC)? In this podcast, Heather welcomes Tom Kopchak, Josh Neubecker, and Meredith Kasper to chat about their experiences working to bring the competition to life. Learn more about CPTC from Tom's blog posts and by visiting the CPTC website and Twitter profile: CPTC Review Part 1: The Se…
 
This week Robert Hansen joins us to talk about privacy as a service, search engine and VPN privacy, the future of cyber-insurance, asset discovery, hackers.org and some tips on starting a security business. My 3 main takeaways were 1) the future of data privacy 2) How he used snapshots of the internet to predict stock prices and 3) what security co…
 
In this podcast, Heather chats with Roxy, our Vulnerability Management Specialist, and Bill Mathews, our Chief Technical Officer and owner of Hurricane Labs, about preparing vulnerability management policies. Be sure you check out some of the related resources mentioned during this episode: How to Write a Vulnerability Management Policy by Roxy NIS…
 
Loading …

빠른 참조 가이드

Google login Twitter login Classic login