Difference between revisions of "ASWEpisode86"

From Security Weekly Wiki
Jump to navigationJump to search
 
(3 intermediate revisions by 2 users not shown)
Line 2: Line 2:
  
 
== Episode Audio ==
 
== Episode Audio ==
<!--
+
 
 
<div align="center">
 
<div align="center">
 
{{#widget:SoundCloud
 
{{#widget:SoundCloud
|id=651835745
+
|id=718825501
 
|width=75%
 
|width=75%
 
|height=100
 
|height=100
Line 12: Line 12:
 
}}
 
}}
 
</div>
 
</div>
-->
+
 
 
==Hosts==
 
==Hosts==
 
{{Template:Matt}}
 
{{Template:Matt}}
Line 22: Line 22:
 
<br>
 
<br>
  
= Interview: Tim Mackey, Synopsys =
+
= Interview: Tim Mackey, [https://securityweekly.com/synopsys Synopsys] =
[[File:TimMackey.jpg|right|220px|thumb|<center>'''[https://twitter.com/timintech Tim Mackey]'''<br> is the  Principal Security Strategist of [https://securityweekly.com/Sysdig Synopsys CyRC (Cybersecurity Research Center)].</center>]] Tim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim applies his skills in distributed systems engineering, mission critical engineering, performance monitoring, and large-scale data center operations to customer problems. He takes the lessons learned from those activities and delivers talks globally at well-known events such as RSA, OSCON, Open Source Summit, KubeCon, Interop, CA World, Container World, DevSecCon, DevOps Days, and the IoT Summit. Tim is also an O’Reilly Media published author.<br><br>'''Segment Topic:'''<br>The security of any application is a function of the decisions made during development.<br><br>'''Segment Description:'''<br>Measuring the risk of those decisions isn't something contained within a single tool, but instead requires a set of perspectives on how a "bad decision" can manifest itself in the security of the app.<br><br>'''Segment Resources:'''<br>
+
[[File:TimMackey.jpg|right|220px|thumb|<center>'''[https://twitter.com/timintech Tim Mackey]'''<br> is the  Principal Security Strategist at [https://securityweekly.com/synopsys Synopsys].</center>]] Tim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim applies his skills in distributed systems engineering, mission critical engineering, performance monitoring, and large-scale data center operations to customer problems. He takes the lessons learned from those activities and delivers talks globally at well-known events such as RSA, OSCON, Open Source Summit, KubeCon, Interop, CA World, Container World, DevSecCon, DevOps Days, and the IoT Summit. Tim is also an O’Reilly Media published author.<br><br>'''Segment Topic:'''<br>The security of any application is a function of the decisions made during development.<br><br>'''Segment Description:'''<br>Measuring the risk of those decisions isn't something contained within a single tool, but instead requires a set of perspectives on how a "bad decision" can manifest itself in the security of the app.<br><br>'''Segment Resources:'''<br>
 
* https://synopsys.com/software
 
* https://synopsys.com/software
 
<br><br>
 
<br><br>
Line 31: Line 31:
 
* [https://www.itsecurityguru.org/2019/11/22/1m-google-hacking-prize/ $1M Google Hacking Prize]
 
* [https://www.itsecurityguru.org/2019/11/22/1m-google-hacking-prize/ $1M Google Hacking Prize]
 
* [https://www.darkreading.com/application-security/12b-records-exposed-in-massive-server-leak/d/d-id/1336439 1.2B Records Exposed in Massive Server Leak]
 
* [https://www.darkreading.com/application-security/12b-records-exposed-in-massive-server-leak/d/d-id/1336439 1.2B Records Exposed in Massive Server Leak]
 +
* [https://www.checkmarx.com/blog/how-attackers-could-hijack-your-android-camera How Attackers Could Hijack Your Android Camera to Spy on You]
 +
* [https://research.securitum.com/xss-in-amp4email-dom-clobbering/ XSS in GMail’s AMP4Email via DOM Clobbering]
  
 
===== If you build it, they will come =====
 
===== If you build it, they will come =====
 +
* [https://aws.amazon.com/blogs/security/defense-in-depth-open-firewalls-reverse-proxies-ssrf-vulnerabilities-ec2-instance-metadata-service/ Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service]
  
 
===== Learning & Tools =====
 
===== Learning & Tools =====
 
* [https://www.darkreading.com/edge/theedge/whats-in-a-waf-/b/d-id/1336402 What's in a WAF?]
 
* [https://www.darkreading.com/edge/theedge/whats-in-a-waf-/b/d-id/1336402 What's in a WAF?]
 +
* [https://blog.cloudflare.com/introducing-flan-scan/ Introducing Flan Scan: Cloudflare’s Lightweight Network Vulnerability Scanner]
  
 
===== Food for Thought =====
 
===== Food for Thought =====
 +
* [https://www.darkreading.com/theedge/when-you-know-too-much-protecting-security-data-from-security-people/b/d-id/1336435 When You Know Too Much: Protecting Security Data from Security People]
  
 
{{SocialMedia}}
 
{{SocialMedia}}

Latest revision as of 17:46, 26 November 2019

Recorded November 25, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • John Kinsella
    is the Vice President of Container Security for Qualys.
  • Mike Shema
    is the Product Security Lead of Square.
  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Tim Mackey, Synopsys

    Tim Mackey
    is the Principal Security Strategist at Synopsys.

    Tim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim applies his skills in distributed systems engineering, mission critical engineering, performance monitoring, and large-scale data center operations to customer problems. He takes the lessons learned from those activities and delivers talks globally at well-known events such as RSA, OSCON, Open Source Summit, KubeCon, Interop, CA World, Container World, DevSecCon, DevOps Days, and the IoT Summit. Tim is also an O’Reilly Media published author.

    Segment Topic:
    The security of any application is a function of the decisions made during development.

    Segment Description:
    Measuring the risk of those decisions isn't something contained within a single tool, but instead requires a set of perspectives on how a "bad decision" can manifest itself in the security of the app.

    Segment Resources:



    News

    Bugs, Breaches, and More!
    If you build it, they will come
    Learning & Tools
    Food for Thought


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+