ES Episode145

From Security Weekly Wiki
Revision as of 14:15, 18 September 2019 by Wheat Loaf (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Recorded July 17, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Strand
    Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Annoucements:

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting and clicking the button to join the list! You can also submit your suggestions for guests by going to and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Enterprise News

    1. Vade Secure's Auto-Remediate adds automated protection for Office 365 environments - Help Net Security
    2. Aqua Security deepens strategic relationship with Microsoft to accelerate Azure deployments - Help Net Security
    3. Trend Micro's Deep Security as a Service now available on the Microsoft Azure Marketplace - Help Net Security
    4. DefenseStorm raises $15M to invest in employees and innovation - Help Net Security
    5. Karamba Security implements its security software on Alpine infotainment systems - Help Net Security
    6. Cloudflare Registers Trademark Sun Microsystems Slogan, The Network is the Computer
    7. Signal Sciences Integrates with Datadog to Provide Real-Time Security Threat Insights
    8. Radware Expands Its Cloud Workload Protection Service to Include Crypto-Jacking Detection - Be Korea-savvy
    9. Reduce the cost of tool sprawl with smarter network monitoring | Ixia
    10. ZeroNorth's platform enhancements to increase breadth and scalability - Help Net Security
    11. ThreatConnect Platform now supports MITRE ATT&CK framework - Help Net Security

    Interview: David Harding, ImageWare Systems, Inc.

    David Harding is the SVP & Chief Technology Officer at ImageWare Systems, Inc.

    David Harding, an accomplished, international executive with more than 25 years of technology implementation and management experience, is responsible for strategic design, technology infrastructure and core strategy from concept through delivery. Before joining ImageWare in 2006, David held several CTO positions, with the most recent at IC Solutions, Inc., where he was responsible for all technology departments, including the management of software development, IT, and quality assurance as well as their respective hardware, software, and human budgets. He has also held CTO and executive management positions at several technology companies, such as, Fulcrum Point Technologies, Inc., ProSoft, and Access360, which is now part of IBM/Tivoli.

    Segment Topic:
    Identity authentication is more important now than at any other time in history. Today's methods such as 2-factor authentication are falling short and are not as secure as once believed. How do we secure our networks, private information, financial transactions, and healthcare data without adding friction and losing privacy? We'll address the authentication methods that exist, when they are appropriate, and how to use both 2FA and multi-factor biometric authentication to control and manage your digital identity.

    Interview: Jared Haggerty, Databerry

    Jared Haggerty
    is the Director, Content and Curation for Databerry.

    20-year veteran of the IT/technology industry who brings a proven track record leading the architecture, testing and deployment of custom solutions. Offers 12 years of CTO/CEO-level experience plus 8 years of IT consulting. Brings comprehensive business, financial and technology skills gained through founding and operating an IT,marketing, real estate firms. Success leading change, building custom solutions and overseeing the delivery of support.

    Segment Description:
    From my understanding giving an overview of security in business where it is now and where it is headed and the use of Automox in the IT Industry