InfoSec สาธารณะ
[search 0]
เพิ่มเติม

ดาวน์โหลดแอปเลย!

show episodes
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
Scott and Pete bring on guests to ramble on about any and all aspects of Information Security, including but not limited to trending news, Red/Blue/Purple team operations, governance, risk, compliance, architecture, assessments, and other focus areas.
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Loading …
show series
 
https://therecord.media/using-vms-to-hide-ransomware-attacks-is-becoming-more-popular/ https://blog.erratasec.com/2021/07/ransomware-quis-custodiet-ipsos-custodes.html?m=1 https://www.databreachtoday.com/how-mespinoza-ransomware-group-hits-targets-a-17086 https://krebsonsecurity.com/2021/07/dont-wanna-pay-ransom-gangs-test-your-backups/ https://ars…
 
In episode 66, Matt Danner joins the show to talk about digital forensics. My 3 main takeaways were 1) How to perform a forensics investigation against Google Storage 2) What the limitations of the Google Drive API are and 3) How to approach iOS and Android devices in an investigation. For more information, including the show notes check out: https…
 
In part 2 of this podcast series, the Hurricane Labs team talks about diversity in infosec–and how it impacts the workplace, the community, and the industry. Click here for our podcast episode transcript.โดย Hurricane Labs
 
Starting as a 15-year-old Isp system admin to becoming the Sr. Principal Consultant at Synapsys, Kevin Nassery's path is as extraordinary as it is insightful. Listen to the latest episode of Humans of Infosec here:โดย Humans of InfoSec
 
This week’s topics include: Akamai Internet Outage, China uses criminal Hackers. iOS “Clickless” Malware, Home & Office Routers under attack, and more! The post InfoSecSync Weekly News Week Ending 23 July 2021 appeared first on InfoSecSync.โดย Nick Thomas
 
Nick interviews Mr. Ron Gula of Gula Tech Adventures. They discuss Advice for Cyber Start-Ups, The Gula Tech Foundation, Ron’s Portfolio Companies, Data Care, and more! The post InfoSecSync Interview – Ron Gula appeared first on InfoSecSync.โดย Nick Thomas
 
This week Nick Thomas & Leyla Gulen discuss: REVIL – Where Are They? Print Nightmare Patch Tuesday Dragos & Deloitte Partner up ..PLUS MORE The post InfoSecSync Weekly News Week Ending 16 July 201 appeared first on InfoSecSync.โดย Nick Thomas
 
In episode 65, I talk with Dr. Martina Dove about the psychology behind fraud, persuasion and scam techniques. My 3 main takeaways were 1) What makes some people more susceptible to fraud 2) the techniques scammers use to convince us to take certain actions and 3) What influence factor is the most powerful For more information, including the show n…
 
https://www.csoonline.com/article/3623760/printnightmare-vulnerability-explained-exploits-patches-and-workarounds.html#tk.rss_all https://www.securityweek.com/continuous-updates-everything-you-need-know-about-kaseya-ransomware-attack https://www.databreachtoday.com/kaseya-raced-to-patch-before-ransomware-disaster-a-17006…
 
This Week, Nick Thomas and Leyla Gula discuss: Keseya Attack, Revil Ransomware, Print Spooler Nightmare, Parsons closes on $203M deal, U.S. Cyber Policy Change…PLUS MORE!! The post INFOSECSYNC WEEKLY NEWS 9 JULY 2021 appeared first on InfoSecSync.โดย Nick Thomas
 
In episode 64, Daniel Cuthbert joins us to talk about the OWASP Application Security Verification Standard. My 3 main takeaways were 1) Why the ASVS will make you a better pen tester and even bounty hunter 2) How to use the ASVS for threat modelling and 3) His tips on getting your talk accepted at a security conference For more information, includi…
 
This week, Nick Thomas and Leyla Gulen are joined by Mr. Kevin Cedeno, Cybersecurity Consultant for VIKTech and President, Huntsville Chapter of ISACA. News Stories Of The Week Include: REVIL Ransomware, Print Spooler Nightmare, Startup Threat Intelligence, Cyber Literacy Act, and more! The post InfoSecSync Weekly News 2 July 2021 appeared first on…
 
This week, Nick Thomas and Leyla Gulen are joined by Mr. Kevin Cedeno, Cybersecurity Consultant for VIKTech and President, Huntsville Chapter of ISACA. News Stories Of The Week Include: REVIL Ransomware, Print Spooler Nightmare, Startup Threat Intelligence, Cyber Literacy Act, and more!
 
In episode 63, I talk with Nico Dekens, a.k.a Dutch_Osintguy about the dangers of relying on one search engine, Telegram OpSec, browser extensions & more. My 3 main takeaways were 1) When specific search engines will give you better results than others 2) How Telegram can be a better OSINT source than Tor and 3) Search techniques for finding the ri…
 
This week we welcome new team member and news anchor, Leyla Gulen. Leyla joins us from Fox 24 Charleston. She is the Host and Executive Producer for FOX 24 News Now Midday and FOX 24 News Now at 11pm. This week’s news articles focuses on: Revil Ransomware, John McAfee, Tax-Deductible Ransomware, Mercedes Breach, and more! The post InfoSecSync Weekl…
 
This week we welcome new team member and news anchor, Leyla Gulen. Leyla joins us from Fox 24 Charleston. She is the Host and Executive Producer for FOX 24 News Now Midday and FOX 24 News Now at 11pm. This week news articles focuses on: Revil Ransomware, John McAfee, Tax-Deductible Ransomware, Mercedes Breach, and more!…
 
In part 1 of this podcast series, the Hurricane Labs team talks about diversity in infosec–and how it impacts the workplace, the community, and the industry. Click here for our podcast episode transcript.โดย Hurricane Labs
 
https://www.reuters.com/technology/us-sec-official-says-agency-has-begun-probe-cyber-breach-by-solarwinds-2021-06-21/ https://www.databreachtoday.com/cisa-firewall-rules-could-have-blunted-solarwinds-malware-a-16919 https://www.wired.com/story/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told/ https://www.bleepingcomputer.com/news/securit…
 
In episode 62, Alissa Knight, the author of Hacking Connected Cars, joins us to talk about hacking connected cars, APIs, defense as well as vulnerability management. My 3 main takeaways were 1) Where to even begin with car hacking 2) The challenges car manufacturers have when trying to defend against these attacks and 3) How APIs are shaping the fu…
 
In episode 61, Robert Graham, the creator of masscan, joins us to talk about running internet wide port scanning the right way. My 3 main takeaways were 1) How to use the banner function correctly 2) How to figure out the fastest rate you can send packets and 3) The most common mistakes Rob sees when folks run masscan For more information, includin…
 
Today we're joined by John Gates, a Lead IT Security Operations Analyst for a global food brand. John has always liked to know how do things work - and that has proven to be a beneficial trait - from his first job as a car mechanic to IT consultancy and education to his current role. He’s also an advisor and former board member at OpsecEdu, an orga…
 
Nick interviews Mr. Boyd White, Director Technical Solutions Engineer. They discuss the current state of Cybersecurity and Ransomware. The post InfoSecSync Interview – Boyd White appeared first on InfoSecSync.โดย Nick Thomas
 
In episode 60, we chat with AJ Yawn about AWS security, compliance in the cloud, choosing an auditor and more. My 3 main takeaways were 1) How to make compliance not suck 2) How to automate security within an AWS environment and 3) What shared responsibility means when managing cloud infrastructure For more information, including the show notes che…
 
In this podcast, Heather speaks with two of Hurricane Labs' Splunkers about machine learning's potential when paired with Splunk. Related articles: Exploratory Data Analysis for Anomaly Detection – Splunk Blogs Cyclical Statistical Forecasts and Anomalies – Splunk Blogs Welcome to the Machine Learning Toolkit – Splunk Docs Machine Learning Crash Co…
 
In episode 59, Tim Adams joins us this week to talk DNS security, Zero Trust, TLD filtering and more. My 3 main takeaways were 1) How to integrate DNS Response Policy Zones, or RPZs, to prevent access to known bad domains 2) How aged a domain should be, sort of like wine, before trusting it and 3) DNS Tunneling, how to identify it and stop it For m…
 
Today we're joined by Samantha Cowan. Sam is currently the Head of Compliance at HackerOne. She's the former Director of Compliance at OneLogin and former Security Engineer at CoverHound, Cyber Policy, and Zenefits. Sam initially perceived Infosec as an "unhappy job", but later found herself taking her MBA and paving her way into the security indus…
 
Ben Dowling hangs out this week to talk about IP Geolocation. My 3 main takeaways were 1) how they determine where an IP address is actually located 2) how they deal with massive amounts of crowdsourced geodata 3) how they attribute IP addresses to specific companies For more information, including the show notes check out: https://breachsense.io/p…
 
In this podcast, Heather chats with members of Hurricane Labs' team about navigating security and IoT devices. Also, make sure to check out some of the resources mentioned during this episode: CloudFree – Smart Home Devices Home Assistant – Open Source Home Automation California Passes Law That Bans Default Passwords in Connected Devices – TechCrun…
 
In episode 56, Assaf Dahan joins us to talk about ransomware, monetization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, i…
 
In this podcast, Heather talks with two of Hurricane Labs' pentesters about how they approach attacking a network and an application. If you're looking to get started with pentesting–or want to improve your skills–participating in CTFs is a great way to do that. Check out Roxy's informational blog-video combination to get a head start on setting up…
 
In episode 56, Assaf Dahan joins us to talk about ransomware, monetization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, i…
 
Loading …

คู่มืออ้างอิงด่วน

Google login Twitter login Classic login