Changes

From Security Weekly Wiki
Jump to navigationJump to search
2,032 bytes added ,  22:25, 20 April 2020
Added By Paul's Craptastic PPWorks Code
<li>We have officially migrated our mailing list to BACK to our original platform! We have our categories nailed down and you are now able to customize what you receive from us based on your preferences by visiting securityweekly.com/subscribe and clicking the button to join the list! Once you have joined, you will also be able to go back and update your "interests" so that we can grow with you as you progress through your journey in InfoSec!</li>
<li>Join us at InfoSecWorld 2020 - June 22nd-24th now at Disney's Coronado Springs Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!</li>
<li>We are looking for high-quality guest suggestions for our Enterprise Security Weekly podcast to fill our upcoming recording schedule! We're committed to educating and providing entertainment for the InfoSec community and we would love to hear from you about who you would like us to interview on the show! Submit your suggestions for guests by visiting securityweekly.com/guests and submitting the form! We review suggestions monthly and will reach out to you once reviewed!</li>
<li>Join Qualys for VMDR Live on April 21 at 2pm ET for a live demonstration of the game-changing Vulnerability Management, Detection & Response offering - a unified solution that integrates vulnerability management, threat prioritization and patching in a single app. Register at securityweekly.com/VMDR2020</li>
</ul>
</p>
= News - Application News - TBD =
<!--
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
-->
{|style="width: 100%;margin: auto; " cellpadding="10"
 
|-
|<p>'''Description:'''<br><br> None</p>
 
 
 
|}
 
==[https://twitter.com/@Codexatron Mike Shema]'s Content: ==
[[Image:mike-shema-0.jpg|50px|thumb|left]]
<br>
{{Template:ASW104NewsMike Shema}}
 
= Interview: Building an AppSec Ecosystem - 6:00-6:45PM =
<!--
-->
{|style="width: 100%;margin: auto; " cellpadding="10"
 
|<center>{{#ev:youtube|1NEFxOXXjHs }}</center>
|-
|}
 
= Fullaudio - None =
<!--
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
-->
{|style="width: 100%;margin: auto; " cellpadding="10"
 
|-
|<p>'''Description:'''<br><br> This week, we welcome Rebecca Black, Senior Staff Application Security Engineer at Avalara, to talk about Building an AppSec Ecosystem! This week in the Application Security News, JSON Web Token Validation Bypass in Auth0 Authentication API, Mining for malicious Ruby gems, A Brief History of a Rootable Docker Image, Privacy In The Time Of COVID, and Threat modeling explained: A process for anticipating cyber attacks!
 
Visit https://www.securityweekly.com/asw for all the latest episodes!
 
Follow us on Twitter: https://www.twitter.com/securityweekly
Like us on Facebook: https://www.facebook.com/secweekly</p>
 
 
 
|}
 
==[https://twitter.com/@johnlkinsella John Kinsella]'s Content: ==
[[Image:John_Kinsella-1.jpg|50px|thumb|left]]
<br>
{{Template:ASW104FullaudioJohn Kinsella}}
==[https://twitter.com/@maldermania Matt Alderman]'s Content: ==
[[Image:MattAlderman-0.png|50px|thumb|left]]
<br>
{{Template:ASW104FullaudioMatt Alderman}}
==[https://twitter.com/@Codexatron Mike Shema]'s Content: ==
[[Image:mike-shema-0.jpg|50px|thumb|left]]
<br>
{{Template:ASW104FullaudioMike Shema}}
 
= News - Malicious Ruby Gems & JSON Web Token Bypass =
<!--
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
-->
{|style="width: 100%;margin: auto; " cellpadding="10"
 
|<center>{{#ev:youtube|CzlqxGdNDhE }}</center>
 
|-
|<p>'''Description:'''<br><br> This week in the Application Security News, JSON Web Token Validation Bypass in Auth0 Authentication API, Mining for malicious Ruby gems, A Brief History of a Rootable Docker Image, Privacy In The Time Of COVID, and Threat modeling explained: A process for anticipating cyber attacks!</p>
 
 
 
|}
 
==[https://twitter.com/@johnlkinsella John Kinsella]'s Content: ==
[[Image:John_Kinsella-1.jpg|50px|thumb|left]]
<br>
{{Template:ASW104NewsJohn Kinsella}}
==[https://twitter.com/@maldermania Matt Alderman]'s Content: ==
[[Image:MattAlderman-0.png|50px|thumb|left]]
<br>
{{Template:ASW104NewsMatt Alderman}}
==[https://twitter.com/@Codexatron Mike Shema]'s Content: ==
[[Image:mike-shema-0.jpg|50px|thumb|left]]
<br>
{{Template:ASW104NewsMike Shema}}
7,886

edits

Navigation menu