InfoSec 公開
[search 0]
もっと

Download the App!

show episodes
 
Scott and Pete bring on guests to ramble on about any and all aspects of Information Security, including but not limited to trending news, Red/Blue/Purple team operations, governance, risk, compliance, architecture, assessments, and other focus areas.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Loading …
show series
 
In this podcast, Heather talks with two of Hurricane Labs' pentesters about how they approach attacking a network and an application. If you're looking to get started with pentesting–or want to improve your skills–participating in CTFs is a great way to do that. Check out Roxy's informational blog-video combination to get a head start on setting up…
 
In episode 56, Assaf Dahan joins us to talk about ransomware, monitization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, i…
 
Arun Abraham joins us on this episode as we explore how to effectively conduct threat hunting. We spend time on general concepts and then focus on threat hunting in the wake of the Solarwinds Supply Chain Compromise and the March 2021 Microsoft Exchange Server vulnerabilities. DISCLAIMER: The opinions, statements, beliefs and viewpoints expressed b…
 
This week Jeff Foley hangs all to talk about asset discovery using amass, recon methodologies, hashcat style brute forcing vs. wordlists, extending functionality via the embedded Lua engine and more. My 3 main takeaways were 1) how to find assets that don’t share a domain name using JARM 2) how they made scanning faster by essentially lowering the …
 
Last year, I was lucky enough to get to sit down with the real guy behind the @fs0c131y account on twitter, Baptiste Robert. The security pro who has reverse engineered most of our favorite apps....for fun and altruistic security! I got to ask him all about the TikTok news, how he got into doing what he does, and more! Grab your favorite beverage a…
 
This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies, NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passw…
 
In this podcast, Heather invites Hurricane Labs' team members Tom, Roxy, and Dusty to discuss the cybersecurity skills gap–and what both security professionals as well as learners can do to address the associated challenges. During the episode, Tom mentions the Global Collegiate Penetration Testing Competition (CPTC)–Tom has been involved in CPTC s…
 
Nick interviews Mr. Brandon McCrillis, CEO & Principal Consultant, Rendition Infosec. They discuss Brandon's path to Cybersecurity, his former career(s) as a chef and CTN in the U.S. Navy. Conversation also leads to Rendition's services. Rendition is a leading information security firm that specializes in red team, incident response, digital forens…
 
Nick interviews Mr. Brandon McCrillis, CEO & Principal Consultant, Rendition Infosec. They discuss Brandon’s path to Cybersecurity, his former career(s) as a chef and CTN in the U.S. Navy. Conversation also leads to Rendition’s services as well as Brandon’s experience as a SANS Instructor. Rendition is a leading information security firm that speci…
 
Ramping up for the 2021 National Cyber Summit, Nick focuses on past interviews from Keynote Speakers and Cyber Security Experts such as: Frank Ciluffo, Director of The McCrary Institute for Cyber Security and Critical Infrastructure protection at Auburn University. Gary Warner, Director of Research at The University of Alabama at Birmingham, Center…
 
Ramping up for the 2021 National Cyber Summit, Nick focuses on past interviews from Keynote Speakers and Cyber Security Experts such as: Frank Ciluffo, Director of The McCrary Institute for Cyber Security and Critical Infrastructure protection at Auburn University. Gary Warner, Director of Research at The University of Alabama at Birmingham, Center…
 
Lee Noriega joins us on this episode as we explore some of the more recent threats to critical infrastructure and how to reduce risk. DISCLAIMER: The opinions, statements, beliefs and viewpoints expressed by the participants on this podcast are those of each individual participant and do not represent that of their employer nor any company, organiz…
 
This week we cover a basic introduction to password cracking with hashcat. We cover why rainbow tables are no longer useful, password salts, identifying hash types, wordlists, attack modes, the rules language, secure hashing algorithms, password safes and more. For more information, including the show notes check out: https://breachsense.io/podcast…
 
Ramping up for The 2021 National Cyber Summit, Nick focuses on past interviews from Keynote Speakers and Cyber Security Experts such as: Retired Brigadier General Jennifer Buckner, Director of Cyber U.S. Army Rober Lee, CEO Dragos Inc. Shirley Zhao, Principal Program Manager, Blackberry These interviews give a peek into the vast information availab…
 
This week we change things up a bit and review a curated (almost) 5 minute summary of the latest InfoSec news including SolarWinds sanctions, language supply chain attacks, Egregor ransomware as a service, N.Korean crypto theft, vuln exploitation in the wild, Mexican politicians and ATM skimming, a new password manager, legal use of look-alike doma…
 
In this new series of the InfoSecSync Podcast, “Women In Cyber”, Nick speaks with Cybersecurity Leader Karen Williams of JRC Integrated Systems. They discuss her career, the Risk Management Framework, mentoring, and more! The post Women In Cyber – Karen Williams appeared first on InfoSecSync.Nick Thomas による
 
This episode provides an overview of the MITRE Shield Framework for Active Defense. Released in August 2020, Shield provides network defenders with opportunities to degrade and disrupt an adversary that has gained initial unauthorized access to a protected network. For more information on MITRE Shield, visit their website: https://shield.mitre.org/…
 
Pete and Scott kickoff their podcast series by stating their intent and laying the ground work for future episodes. DISCLAIMER: The opinions, statements, beliefs and viewpoints expressed by the participants on this podcast are those of each individual participant and do not represent that of their employer nor any company, organization or instituti…
 
This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies, NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passw…
 
On today’s show, Heather Terry chats with Steve McMaster, Brian Karrigan, Dusty Miller, and Austin O'Neil as they wrap up their discussion on designing a security operations center (SOC). In case you missed it, make sure to listen to Designing a SOC: Internal or External? Part 1. Click here for our podcast episode transcript.…
 
Nick interviews Major Johnathan Poarch of the Alabama National Guard. They discuss his career, what Cyber is like in the Army/National Guard Cyber, Cyber Protection Teams, Compliance and more! The post InfoSecSync Podcast Episode ISS_039 appeared first on InfoSecSync.Nick Thomas による
 
For our latest Humans of InfoSec podcast, we’re excited to welcome Phillip Wylie on the show. Phillip has over 22 years of experience with the last 8 years spent as a pentester. Phillip has a passion for mentoring and education. His passion motivated him to start teaching and founding The Pwn School Project a monthly educational meetup focusing on …
 
This week pdp hangs out to chat about PownJS, SecApps, recon tool orchestration and tool development. My 3 main takeaways were 1) how to integrate PownJS into your recon process 2) his recon workflow and 3) Why JavaScript is a great language for quick PoC development For more information, including the show notes check out https://breachsense.io/po…
 
This is hands down my favorite episode to date. I sit down and have a virtual happy hour with my entire team from Mandiant Security Validation. We have one of, if not the best teams I've ever been lucky enough to be apart of. This is easily our largest group to be interviewed...but we work so well together, you won't even notice ;) . The only rule …
 
Nick Thomas Interviews Mr. Jeremy Leasher, Security Solutions Architect at Axellio Inc. and his 21-year Army Career as a 255S Cyber Warrant Officer. We also discuss: Security Education & Training Axellio educating their customer base, Threat Hunting & Incident response, and more! The post InfoSecSync Podcast Episode ISS_038 appeared first on InfoSe…
 
Nick Thomas Interviews Mr. Jeremy Leasher, Security Solutions Architect at Axellio Inc. and his 21-year Army Career as a 255S Cyber Warrant Officer. We also discuss: Security Education & Training Axellio educating their customer base Threat Hunting & Incident response and more! Copyright(c)2021 Nick Thomas…
 
This week Gabrielle Botbol joins the show to talk about getting into the world of pen testing, certs, CTFs, self study resources, report writing, repeatable risk scoring, finding XSS and staying current. My 3 main takeaways were 1) the CTFs you should be practicing on 2) some strategies to gain credibility in the industry and 3) which certs are wor…
 
The Schrems II ruling and Brexit mean that UK organisations are required to reconsider the legal basis for the transfer of personal data to and from Europe.The webinar recording covers:The Schrems II decision regarding transfers of data;The implications for UK and EU data controllers regarding data transfers;The types of data transfers organisation…
 
The EU General Data Protection Regulation (GDPR) highlights how the principles of ‘privacy by design’ and ‘privacy by default’ are fundamental to ensuring that organisations protect the rights of data subjects.We take a look at Data Protection By Design And By Default Under The GDPR in this webinar recording…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login