ES Episode150

From Security Weekly Wiki
Jump to navigationJump to search

Recorded August 21, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Strand
    Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Annoucements:

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting and clicking the button to join the list! You can also submit your suggestions for guests by going to and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Enterprise News

    1. Thycotic launches automated solution for managing service accounts
    2. ThreatConnect Releases Enhanced Integration with Flashpoint
    3. Jumio joins X-Sight Marketplace, a financial crime management ecosystem - Help Net Security
    4. CloudKnox Cloud Security Platform for VMware Cloud on AWS is now available - Help Net Security
    5. Agio Launches New Cybersecurity Technical Testing Program
    6. BitSight Announces Enterprise Analytics
    7. StackRox Kubernetes Security Platform Offered on Google Cloud Platform (GCP) Marketplace
    8. Greenbone introduces virtual appliances for vulnerability management - Help Net Security
    9. ObserveIT unveils crowdsourced insider threat analytics solution - Help Net Security

    Black Hat Interview 2019: Coresecurity, Endgame, & Edgewise

    We interview Steve Laubenstein, VP of Threat Security at Coresecurity.

    Segment Topic:
    A look at the pervasive evasion techniques malware authors use to circumvent detection.

    We interview Ian McShane, VP of Product Marketing at Endgame.

    Segment Topic:
    While Windows may dominate the lion’s share of OS system usage across the enterprise, many of an organization’s most sensitive systems run on MacOS or Linux. From the CEO’s laptop to BI applications and webservers – without complete protection your business-critical applications and workloads are vulnerable to attack. Endgame is announcing Mac and Linux parity preventions as the first-of-its-kind to give security leaders peace of mind across their entire enterprise.

    We interview Peter Smith, Founder & CEO at Edgewise.

    Segment Topic:
    Microsegmentation (we can refine as we get closer, and it would be great to get some suggestions from your team. We tend to iterate on the same things over here but I think it would be more valuable to get a PoV from the S/W audience)

    Black Hat Interview 2019: VMRay and Blue Voyant

    We interview Carsten Willems, CEO & Co-Founder at VMRay.

    Segment Topic:
    A look at the pervasive evasion techniques malware authors use to circumvent detection.

    We interview David Etue, Global Head of Managed Security Services at Blue Voyant.

    Segment Topic:
    How Small and Midsize Organizations Achieve the Same Level of Security as the Largest and Most Well Defended Organizations