Difference between revisions of "ASWEpisode95"

From Security Weekly Wiki
Jump to navigationJump to search
Line 37: Line 37:
 
* [https://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/ Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Access]
 
* [https://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/ Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Access]
 
* [https://blogs.dropbox.com/tech/2020/02/dropbox-bug-bounty-program-has-paid-out-over-1000000/ Dropbox bug bounty program has paid out over $1,000,000]. It's not exactly a goal of programs to reach payout milestones quickly, but it is good to see this kind of information sharing in addition to awarding researchers.
 
* [https://blogs.dropbox.com/tech/2020/02/dropbox-bug-bounty-program-has-paid-out-over-1000000/ Dropbox bug bounty program has paid out over $1,000,000]. It's not exactly a goal of programs to reach payout milestones quickly, but it is good to see this kind of information sharing in addition to awarding researchers.
 +
* [https://www.space.com/boeing-starliner-2nd-software-glitch-potential-collision.html]
 +
* [https://securitynews.sonicwall.com/xmlpost/linear-emerge-e3-access-controller-actively-being-exploited/]
  
 
===== Cloud, Code & Controls =====
 
===== Cloud, Code & Controls =====

Revision as of 18:07, 10 February 2020

Recorded February 10, 2020 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Mike Shema
    is the Product Security Lead of Square.
  • John Kinsella
    is the Vice President of Container Security for Qualys.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Shaun Lamb, SAS Institue

    Shaun Lambis the Principal Application Security Architect of SAS Institue.

    Shaun Lamb works as a Principle Application Security Architect at SAS Institute where he focuses on application, API, and container security. With a background in web application development, he strives to design solutions that make it easy for developers and administrators to apply security controls. Shaun holds a CSSLP and has presented at conferences such as:



    Segment Topic:
    Mitigating at Design Time

    Segment Description:

    • Discuss strategies for how best to design applications so they are "secure by default" and have fewer incidents and vulnerabilities.
    • How DevOp or DevSecOps positively changes the relationship between security and development/operations including: the application design process, security testing, and security education programs.
    • The security impact of applications moving to a microservices based architecture running on Docker/Kubernetes and the role of an API Gateway.



    News

    Flaws, Breaches, & Threats
    Cloud, Code & Controls
    Learning & Tools
    Food for Thought


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+