- 1 Paul's Security Weekly - Episode 487
- 2 Announcements
- 3 Interview: Chris Roberts, Acalvio Technologies - 6:00-7:00PM
- 4 Technical Segment: Why Signatures Suck with Mark Dufresne, Endgame - 7:00PM-7:30PM
- 5 Security News - 7:30PM-8:30PM
Paul's Security Weekly - Episode 487
Recorded: October 27, 2016
- Jeffrey Man - Cryptanalyst, infosec analyst, pioneering ex-NSA pen tester, PCI specialist and certified security curmudgeon
- Jack Daniel - Works for Tenable Network Security and is a co-founder of Security BSides.
- Larry Pesce, Director of Research and Senior Managing Consultant at InGuardians
- Larry Pesce, Swami of Security, Oracle of the Online and Hotshot Of Hacking
- Larry Pesce, destroyer of embedded systems and injector of RF energy.
- Michael Santarcangelo - founder of SecurityCatalyst.com, author of Into the Breach, and creator of the leadership-driven Straight Talk Framework - with our favorite question, "What problem are you trying to solve?"
- Joff Thyer - SANS Instructor, Penetration Tester and Security Researcher with Black Hills Information Security.
- Joff Thyer, Geeking out with the best of them. Known to attract multiple waitresses with a single smile and utterance of g'day. Deployer of cocktail recipes in desperate situations. Hacker of many a thing! If it's got code running on it, it can be hacked.
- Joff Thyer, musician, proud father, and friend to many.
- Paul Asadoorian - He is a male who is extremely charming in manner because of his gentlemanly behavior. He has good looks and thinks that women are better than men. He also has a high pain tolerance and likes it kinky.
- Make sure you visit http://securityweekly.com/subscribe and subscribe to our new shows including Enterprise Security Weekly and Startup Security Weekly. You can also subscribe to all shows individually, as well as a main feed which contains this show, Hack Naked TV and Enterprise Security Weekly.
- (webcast announcement)
Interview: Chris Roberts, Acalvio Technologies - 6:00-7:00PM
Chris Roberts is considered one of the world’s foremost experts on counter threat intelligence within the Information security industry. At Acalvio, Chris helps drive Technology Innovation and Product Leadership. In addition, he directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. With increasingly sophisticated attack vectors, Chris’ unique methods of addressing the evolving threat matrix and experience with a variety of environments - Enterprise, Industrial, and IoT, make Roberts and his team an indispensable partner to organizations that demand robust, reliable, resilient and cost-effective protection. Chris is a regular speaker at leading industry conferences, has been featured in several documentaries and is regularly quoted in national newspapers, television news and industry publications.
Technical Segment: Why Signatures Suck with Mark Dufresne, Endgame - 7:00PM-7:30PM
Why signatures don’t really work for detection and about what folks should be thinking about instead.
Security News - 7:30PM-8:30PM
- This Evil Office Printer Hijacks Your Cellphone Connection
- Three hospitals in England cancel operations over computer virus
- Cisco says it'll make IoT safe because it owns the network
- Ubiquiti all the things: how I finally fixed my dodgy wifi
- Its time to regulate baby monitors
- How Hackers Can Steal Your Cell Phone Pictures From Your Crock-Pot
- Belkins WeMo Gear Can Hack Android Phones
- New, fast-spreading IoT botnet hybridizes two less-effective strains to achieve quick dominance
- Fixing the communications breakdown between IT security and the board and c-suite
- Alarmed by Admiral's data grab? Wait until insurers can see the contents of your fridge
- Admiral Insurance to use algorithms to set insurance prices based on customers' Facebook posts
- Flipboard on Flipboard
- Google security head says Pixel is as secure as the iPhone
- Unsecured Internet of Things gadgets get hacked within 40 minutes of being connected to the net
- Webcams Used To Attack Twitter And Reddit Recalled
- Windows 10 Vulnerability AtomBombing Can Bypass Security Software
- Disappearing Messages Added to Signal App
- IoT Devices as Proxies for Cybercrime
- Telnet, SSH prod of death smashes Cisco broadband boxes offline
- How Hackers Plant False Flags to Hide Their Real Identities | Motherboard
- Nuclear Power Plant Disrupted by Cyber Attack
- JTAG Explained (finally!): Why "IoT" Makers, Software Security Folks, and Device Manufacturers Should Care - Senrio
- We're Not Going To Beat Cybercrime In Our Lifetime
- MITRE Will Give You $50k To Fingerprint Rogue IoT Devices
- IoT Malware Has Apparently Reached Almost All Countries
- Sex robots with warm skin to hit dating scene and could benefit relationships
- 4 cybersecurity trends you need to be aware of
- 4 cybersecurity trends you need to be aware of
- Yahoos CISO resigned in 2015 over secret e-mail search tool ordered by feds
- Hack Crashes Linux Distros with 48 Characters of Code
Michael's (Santa) Stories
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.