ASW Episode50

From Paul's Security Weekly
Jump to: navigation, search

Recorded February 11, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Joff Thyer
    SANS Instructor, penetration tester, and Security Researcher at Black Hills Information Security.
  • Announcements

    • RSA Conference 2019 is coming up March 4 – 8 in San Francisco! Go to to register now using the discount code 5U9SWFD to receive $100 off a full conference pass! If you are interested in booking an interview or briefing with Security Weekly, please go to to submit your request!
    • Join us April 1-3, at Disney's Contemporary Resort for InfoSec World 2019 where you can connect and network with like-minded individuals in search of actionable information. Visit and use the registration code OS19-SECWEEK for 15% off the Main Conference or World Pass. If you are interested in booking an interview or briefing with Security Weekly, please go to to submit your request!
    • Registration is now open for the first Security Weekly webcast of 2019! You can register for our "Rise Above Complex Workflows: Practical Ways To Accelerate Incident Response" webcast now by going to

    Interview: Tim Eades, vArmour

    Tim Eades
    is the CEO at vArmour.
    With over 20 years of leadership experience in sales, marketing, and executive management at the CEO level, Tim has deep expertise in driving high growth for computing, security and enterprise software companies. Tim joined vArmour as CEO in October 2013. Prior to that, he was the CEO at Silver Tail Systems from March, 2010 until the company was acquired by RSA, the security division of EMC in late 2012. Prior to leading Silver Tail Systems, Tim was CEO of, an SMB focused SaaS company that was acquired by Proofpoint. Tim has also held sales and marketing executive leadership positions at BEA Systems, Sana Security, Phoenix Technologies and IBM. Tim holds advanced degrees in business, international marketing, and financial analysis, primarily from Solent University in England.

    Topic: Basic flow of Problem, Solution, and Value


    Bugs, Breaches, and More!

    1.) Most of the Fortune 100 still use flawed software that led to the Equifax breach

    2.) MongoDB databases still being held for ransom, two years after attacks started

    3.) Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords

    If you build it, they will come

    1.) Many popular iPhone apps secretly record your screen without asking

    2.) Apple tells app developers to disclose or remove screen recording code

    3.) Chrome extension with millions of users is now serving popup ads

    Learning & Tools

    1.) VSCode Theme Colors

    2.) Learn to use JSON Web Tokens for Authentication

    3.) How to Break Up with Your Phone

    Food for Thought

    1.) Facebook broad data collection ruled illegal by German anti-trust office

    2.) Investors and entrepreneurs need to address the mental health crisis in startups

    3.) CommitStrip: Let it be known

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+