Marcus Carey is the Founder & CEO at Threatcare. Navy Cryptologist turned cybersecurity entrepreneur, Marcus Carey is Currently working as founder and CEO of cybersecurity company Threatcare. He joins us talk about the book that he Co-Authored, "Tribe of Hackers"!
Full Show Notes: https://wiki.securityweekly.com/Episode598
Follow us on Twitter: https://www.twitter.com/securityweekly
We interview Carsten Williams, Co-Founder and CEO at VMRay, discussing malware sandboxing! Carsten is the original developer of CWSandbox, a commercial malware analysis suite that was later renamed to GFI Sandbox, and now Threat Analyzer by ThreatTrack Security.
To learn more about VMRay, visit: https://securityweekly.com/vmray Full Show Notes: https://wiki.securityweekly.com/Episode597
Follow us on Twitter: https://www.twitter.com/securityweekly
David Marble is the President & CEO at OSHEAN. David joins us to talk about what to expect at at this years Rhode Island Cybersecurity Exchange Day! This conference will be held on March 13th 2019 from 9am to 3pm at Salve Regina University, w/ a featured keynote by our Founder and CTO, Paul Asadoorian!
Full Show Notes: https://wiki.securityweekly.com/Episode596
Follow us on Twitter: https://www.twitter.com/securityweekly
Allan Liska is the Senior Solutions Architect at Recorded Future. Allan talks about threat intelligence – no longer just for the secret squirrels among us. While the term can elicit reactions ranging from exasperated sigh to flashbacks of security buzzword bingo circa 2015, Recorded Future is delivering on the industry promise – actionable intelligence for all security pros.
Get Trending Threat Insights Delivered to Your Inbox, at: https://securityweekly.com/recordedfuture
Full Show Notes: https://wiki.securityweekly.com/Episode596
Follow us on Twitter: https://www.twitter.com/securityweekly
Steve Brown, Keynote Speaker at SecureWorld Boston 2019 to discuss his talk about Building Your Strategic Roadmap for the Next Wave of Digital Transformation!
Full Show Notes: https://wiki.securityweekly.com/Episode595
Follow us on Twitter: https://www.twitter.com/securityweekly
Harry Sverdlove, Chief Technology Officer of Edgewise for an interview, to talk about The Future of Firewalls!
To learn more about Edgewise, visit: https://www.securityweekly.com/edgewise
Full Show Notes: https://wiki.securityweekly.com/Episode594
Follow us on Twitter: https://www.twitter.com/securityweekly
Connie Mastovich is the Sr. Security Compliance Analyst at Reclamere and she will be speaking at InfoSec World 2019. Connie's talk will be about "The Dark Web 2.0: How It Is Evolving, and How Can We Protect Ourselves?" Connie teases her talk and explains how to protect ourselves, our clients, and the information that we handle daily.
Full Show Notes: https://wiki.securityweekly.com/Episode593
Follow us on Twitter: https://www.twitter.com/securityweekly
Benjamin Daniel Mussleris the Senior Security Researcher at Acunetix. Benjamin will come on the show to talk about Web App Scanning with authentication.
To learn more about Acunetix, visit: https://securityweekly.com/acunetix
Full Show Notes: https://wiki.securityweekly.com/Episode592
Follow us on Twitter: https://www.twitter.com/securityweekly
Christopher Morales is Head of Security Analytics at Vectra, where he advises and designs incident response and threat management programs for Fortune 500 enterprise clients. Christopher is a widely respected expert on cybersecurity issues and technologies and has researched, written and presented numerous information security architecture programs and processes.
Full Show Notes: https://wiki.securityweekly.com/Episode591
Follow us on Twitter: https://www.twitter.com/securityweekly
Dr. Eric Cole is the leading cybersecurity expert in the world, known as the go-to for major political and business power players.
Full Show Notes: https://wiki.securityweekly.com/Episode590
Follow us on Twitter: https://www.twitter.com/securityweekly
Bryson is the Founder and CEO of SCYTHE and Founder of GRIMM. He comes on the show to talk about Attack Simulation.
To learn more about SCYTHE.io, go to: https://www.scythe.io/securityweekly
Full Show Notes: https://wiki.securityweekly.com/Episode589
Follow us on Twitter: https://www.twitter.com/securityweekly
"Phoneboy" has been helping the security community for over 15 years. We fondly remember Phoneboy as a resource that helped us configure our Check Point firewalls back in the day! Phoneboy comes on the show to discuss how to help people in the security community, a topic near and dear to our hearts.
Full Show Notes: https://wiki.securityweekly.com/Episode588
Follow us on Twitter: https://www.twitter.com/securityweekly
Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. Instead, she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, sustainable, ethical neuro tech, and improving the lives and community of InfoSec professionals and Neurodiverse professionals. She enjoys art, requires loads of rest still, and hopes to be half the person her service dog, Trevor, is.
Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke
Full Show Notes: https://wiki.securityweekly.com/Episode587
Follow us on Twitter: https://www.twitter.com/securityweekly
Ed Skoudis, Founder of the Counter Hack Challenge and Kringle Con 2018, joins us on the show to talk about this years challenge and what's in store! "Welcome to Counter Hack Challenges, an organization devoted to creating educational, interactive challenges and competitions to help identify people with information security interest, potential, skills, and experience. We design and operate a variety of capture-the-flag and quiz-oriented challenges for the SANS Institute, Cyber Aces, US Cyber Challenge, and other organizations. Our featured products include NetWars, CyberCity, Holiday Hack Challenge, Cyber Aces Online, and several Cyber Quests."
Join KringleCon: www.kringlecon.com
Full Show Notes: https://wiki.securityweekly.com/Episode586
Follow us on Twitter: https://www.twitter.com/securityweekly
Don Murdoch is the Assistant Director at Regent University Cyber Range. Don discusses his book "Blue Team Handbook Incident Response Edition".
Full Show Notes: https://wiki.securityweekly.com/Episode586
Follow us on Twitter: https://www.twitter.com/securityweekly
Wietse Venema and Dan Farmer, the Developers of Security Administrator Tool for Analyzing Networks (SATAN), talk about their experience as developers, their journey to creating SATAN and their decision to keep SATAN a open source tool.
Full Show Notes: https://wiki.securityweekly.com/Episode584
Follow us on Twitter: https://www.twitter.com/securityweekly
Jon Buhagiar is responsible for Network Operations at Pittsburgh Technical College for the past 19 years. Jon is currently a Network+ Review Course Instructor at Sybex, and he joins us to talk about Network Operations at Sybex.
Full Show Notes: https://wiki.securityweekly.com/Episode583
Follow us on Twitter: https://www.twitter.com/securityweekly
Corin Imai is Sr. Security Advisor for DomainTools. Corin began her career working on desktop virtualization, networking, and cloud computing technologies before delving into security. This interview, they talk about DNS, phishing tools, and tease what DomainTools has in store for 2019.
Full Show Notes: https://wiki.securityweekly.com/Episode582
Follow us on Twitter: https://www.twitter.com/securityweekly
Mark Dufresne explains why MITRE created their tool and what the MITRE attack framework is.
Full Show Notes: https://wiki.securityweekly.com/Episode579
Follow us on Twitter: https://www.twitter.com/securityweekly
Lee Neely is a senior IT and security professional at LLNL with over 25 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions.
Full Show Notes: https://wiki.securityweekly.com/Episode578
Visit our website: http://securityweekly.com
Follow us on Twitter: https://www.twitter.com/securityweekly
Mike Nichols is the VP of Product Management at Endgame, and he manages the Endgame endpoint protection platform. Keith McCammon is the Chief Security Officer and Co-Founder of Red Canary, and he runs Red Canary’s Security Operation Center. Shawn Smith is the IT Security Manager at Panhandle Educators Federal Credit Union. They discuss the problems Shawn had that led him to choose Red Canary and Endgame as his solution, skill shortages in vendors, what he did to convince his management to approve of this solution, and what his process for testing the effectiveness of these solutions was.
Full Show Notes: https://wiki.securityweekly.com/Episode577
Visit https://www.securityweekly.com/psw for all the latest episodes!
Mike Ahmadi oversees IoT security solutions and technical implementations for DigiCert customers across various verticals that include industrial, transportation, smart city, consumer devices and healthcare.
Full Show Notes: https://wiki.securityweekly.com/Episode576
Visit our website: http://securityweekly.com
Follow us on Twitter: https://www.twitter.com/securityweekly
Eyal Neemany describes how to bypass Linux Pluggable Authentication Modules provide dynamic authentication support for applications and services in a Linux or GNU/kFreeBSD system. Eyal Neemany is the Senior Security Researcher for Javelin Networks.
→Full Show Notes: https://wiki.securityweekly.com/Episode575
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly
→Like us on Facebook: https://www.facebook.com/secweekly
Brian Coulson is a Senior Security Research Engineer in the Threat Research Group of LogRhythm Labs in Boulder, CO. His primary focus is the Threat Detection Modules such as UEBA, and NTBA.
→Full Show Notes: https://wiki.securityweekly.com/Episode575
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly
→Like us on Facebook: https://www.facebook.com/secweekly
Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process.
***Powerpoint Slides in Full Show Notes***
Full Show Notes: https://wiki.securityweekly.com/Episode574
Visit our website: http://securityweekly.com
Follow us on Twitter: https://www.twitter.com/securityweekly