ES Episode153

From Paul's Security Weekly
Jump to: navigation, search

Recorded September 11, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Strand
    Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Annoucements:

    • Register for one of our upcoming webcasts with Bryce Shroeder and Barbara Kay of ServiceNow, Kevin O'Brien of GreatHorn, or Steve Laubenstein of Core Security (or all of them!) by going to -> Click the webcast dropdown & Select Registration! If you have missed any of our previously recorded webcasts, you can find our on-demand library by selecting on-demand from the webcast drop down! If you attend any of our webcasts, you will receive 1 CPE credit per webcast!
    • We're currently running our annual Listener Feedback Survey! Please visit -> click the survey tab & select "2019 Listener Survey" to submit your responses!
    • The new Security Weekly website is officially live! Visit to check out all of our new sorting and filtering functionality! Please let us know if you find any issues or have any feedback by sending to
    • Paul will be providing his insights & predictions in the information & cyber security space at a local (ISC)2 RI Chapter Meeting on Monday, November 18th @ Gregg's Restaurant in Providence. If you would like to join us, go to

    Enterprise News

    1. Splunk buys SaaS startup Omnition | ZDNet
    2. Stage Fund buys Israeli cybersecurity co Cymmetria
    3. Trustwave platform brings more visibility and control cloud security
    4. Shape Security Blog : The War No One is Talking About
    5. VMware buys Carbon Black and Pivotal, valued together at $4.8 billion
    6. Palo Alto Networks Announces Intent to Acquire Zingbox
    7. Vectra introduces a privilege-aware network detection and response solution
    8. Quest Announces Newest Release of the KACE SMA for Stronger Unified Endpoint Management and Security
    9. SyncDog partners with Symantec to address full spectrum of mobile security concerns - Help Net Security
    10. Awake Security enhances its platform with the ability to identify attackers based on their intent - Help Net Security
    11. Ping Identity launches initial public offering of its common stock - Help Net Security
    12. HackerOne Raises $36.4 Million in Series D Funding Round | SecurityWeek.Com

    Interview: Steve Laubenstein, Core Security - a HelpSystems Company

    Steve Laubenstein is the VP - Cyber Threat Products Group at Core Security - a HelpSystems Company
    Steve Laubenstein has been working for cyber security companies for the past 20 years, most recently as the GM for Core Security's Penetration Testing Solutions and now he heads up the Cyber Threat Business Unit at Core Security, a HelpSystems company.

    Segment Topic:
    Elements of an effective penetration testing program in an interconnected world

    Segment Description:
    The need to understand your system's resilience to attacks, and your people's ability to quickly identify and respond, has never been higher. Yet, we live in an IT world that is increasingly becoming borderless. We will be discussing the role of pen testing where mobile, cloud, IoT and network sprawl are the new normal.

    Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium

    We interview Dan Cornell, the Founder & CTO the at DenimGroup.

    Segment Topic:
    Injecting the “Sec” into “DevSecOps” has always been a balancing act of getting the best reasonable coverage in the shortest reasonable length of time. Slowing down the DevOps process is a sure-fire way to get pulled out of the pipeline. Because of the current business culture, security teams are often forced to wait until the last minute to address any vulnerabilities within the developed code, leaving the organization vulnerable to security issues. These kinds of practices can leave companies and anyone within their ecosystem exposed to attacks which can cripple networks and cost millions in reparations. During this recording, Dan will speak directly to the difficulties organizations face in fitting security into the DevOps stack, how to change the current paradigm, and how organizations can streamline communication between Security and DevOps with the goal of earning itself a seat at the [board room] table.

    We interview Bryson Bort, the Founder & CEO at SCYTHE.

    Segment Topic:
    Bryson covers some his research and talks in the IoT space.

    We interview Yuriy Bulygin, the Founder & CEO at Eclypsium.

    Segment Topic:
    Yuriy will be giving 5 Tips for Protecting Firmware from Attacks. Firmware is the unguarded attack surface of the enterprise. Hackers attack firmware because they know many security and IT managers aren’t paying attention to it, and because firmware level attacks are persistent, stealthy, and able to bypass most security measures. The Meltdown and Spectre vulnerabilities introduced the world to the power of hardware-level weaknesses, LoJax malware brought UEFI rootkits into the wild, and BMC firmware vulnerabilities have impacted servers in the supply chain and the cloud. Laptops, servers and network devices are all at risk. Yuriy Bulygin, CEO of Eclypsium and founder of CHIPSEC, will discuss why firmware security is important, and steps that security teams can take to protect enterprise devices.