- 1 Paul's Security Weekly #556
- 2 Announcements
- 3 Interview: Adrian Sanabria, Savage Security - 6:00PM-6:45PM
- 4 Topic: Penetration Testing Is Dead. Long Live Penetration Testing. - 6:45-7:45PM
- 5 Security News - 7:45PM-8:30PM
Paul's Security Weekly #556
Recorded April 19, 2018 at G-Unit Studios in Rhode Island!
- Check out our On-Demand material! Some of our previously recorded webcasts are now available On-Demand at: securityweekly.com/ondemand.
- Ticket Sales are open for Social Engineering RI Conference. Saturday, June 6th at Salve Regina University in Newport RI. Go to - http://se-ri.org/ to register! We are giving away 2 tickets to this conference. Please send your best meme of Paul and Larry to firstname.lastname@example.org.
- How do you feel about User and Entity Behavior Analytics? What about your SEIM? Check out Logrhythm's webcast on June 14th at 3:00pm-4:00pm.
Interview: Adrian Sanabria, Savage Security - 6:00PM-6:45PM
- How did you get your start in information security?
- What prompted the decision to spend a few years of your career as an analyst?
- What does an analyst in information security do exactly?
- What is the most challenging thing about being an analyst?
- What do analysts get right and what do they tend to get wrong?
- If you are working in security today defending an enterprise, how can you best use analysts and analyst data?
- What do most enterprises get right when it comes to security? Wrong?
- What are some of the hot technologies in security today that actually solve problems for customers?
- What are some of the trends that are based on FUD and not here to stay?
Topic: Penetration Testing Is Dead. Long Live Penetration Testing. - 6:45-7:45PM
We've spent time defining the value of penetration testing, how we can do them better and how organizations can make the most out of this activity. The question today is, "Do we still need penetration tests?". If you are conducting penetration testing today or in the market for some testing, this segment is for you!
- Why should we reconsider penetration testing?
- What value do we miss out on if we skip penetration tests?
- What technologies can replace, at least in part, penetration tests today?
- How do we know our applications are secure if we do not have 3rd party evaluations?
- How do attack simulations help to change penetration testing?
- How do bug bounties or crowd-sourced penetration tests change the landscape?
- What can penetration testers do to provide more value?
- PCI required a penetration test, do you see this changing?
Security News - 7:45PM-8:30PM
- Microsoft built its own custom Linux OS to secure IoT devices - "Each chip includes custom silicon security technology from Microsoft, inspired by 15 years of experience and learnings from Xbox, to secure this new class of MCUs and the devices they power,"
- Another Critical Flaw Found In Drupal CorePatch Your Sites Immediately - Discovered by the Drupal security team, the open source content management framework is vulnerable to cross-site scripting (XSS) vulnerability that resides in a third-party plugin CKEditor which comes pre-integrated in Drupal core to help site administrators and users create interactive content.
- Facebook Plans to Build Its Own Chips For Hardware Devices - According to the post, Facebook is looking for an expert in ASIC and FPGA—two custom silicon designs to help it evaluate, develop and drive next-generation technologies within Facebook—particularly in artificial intelligence and machine learning.
- The Role of KPIs in Incident Response
- Microsoft claims to make Chrome safer with new extension - Chrome already provides effective protection against malicious sites: go somewhere with a poor reputation and you'll get a big, scary red screen telling you that you're about to do something unwise. But Microsoft believes it can do a better job than Google, and it has released a Chrome plugin, Windows Defender Browser Protection, that brings its own anti-phishing protection to Google's browser.
- NSA reveals how it beats 0-days - the vast majority of the incidents that the NSA deals with aren’t the latest and greatest in APTs or cutting-edge 0-days – 93% of all security incidents in the last year at the NSA were found to be entirely preventable using best practices they already advocated
- Hackers are using botnets to take the hard work out of breaking into networks
- The risks of cyber-conflict with Russia
- NHS website defaced by hackers
- Cloud Credentials: New Attack Surface for Old Problem
- IoT Security Concerns Peaking With No End In Sight
- Over 2 Million Users Installed Malicious Ad Blockers From Chrome Store
- 7 books you must read to be a real software developer
- Impregnable 14 Brilliant Defensive Features of Medieval Castles
- Your router might secretly be involved in cyber warfare. Here's how to be safe
Off-Topic Stories Of The Week
- Password/passphrase enforcement under windows
- the end of domain fronting from Google.
- oh, that's NICE. List standard language on hiring for Cyber security
- FDA to require updates and better security for medical devices
- Robin Wood goes from SNMP to Shell
- Australia joins US and UK in blaming Russian-backed hackers for cyber-attacks "The attacks targeted Cisco routers with “Smart Install” and potentially affected government departments, companies and infrastructure facilities running Cisco equipment."
- Stop Using 6-Digit iPhone Passcodes"GrayKey is able to unlock some iPhones in two hours, or three days for phones with six digit passcodes"
- Supreme Court Vacates Microsoft Email Privacy Case "The Supreme Court has vacated United States v. Microsoft, a case concerning whether a U.S. communications law can be used by a U.S. law enforcement agency to obtain personal data stored outside of the U.S."
- Facebook moves 1.5bn users out of reach of new European privacy law "Facebook has moved more than 1.5 billion users out of reach of European privacy law, despite a promise from Mark Zuckerberg to apply the “spirit” of the legislation globally."
- Microsoft, Facebook and other tech giants join forces on cybersecurity
- Why ‘remote detonator’ is a bad name for your Wi-Fi network