Paul's Security Weekly - Episode 474 - 6:00PM
Recorded: July 21, 2016
 Coming Soon
Interview: John Kindervag
With more than 25 years of high tech experience, John is best known for creating the highly influential “Zero Trust” model of information security. He currently advises both public and private sector organizations with the design and building of Zero Trust Networks. He holds, or has held, numerous industry certifications, including QSA, CISSP, CEH, and CCNA. John has a practitioner background, having served as a security consultant, penetration tester, and security architect before joining Forrester. He has particular expertise in the areas of secure network design, wireless security, and voice-over-IP hacking. He has been interviewed and published in numerous publications, including The Wall Street Journal, Forbes, and The New York Times. He has also appeared on television networks such as CNBC, Fox News, PBS, and Bloomberg discussing information security topics. John has spoken at many security conferences and events, including RSA, SXSW, ToorCon, ShmoCon, InfoSec Europe, and InfoSec World.
- How did you get your start in information security?
- What is the Zero Trust network architecture?
- Many people ask me what they can do to secure their Big Data deployments and databases and as for best practices, what is your advice?
- The decisions people make about whether or not to put data in the cloud seem split, some say "No Cloud", some "Maybe" and some are all in, what advice do you have for those who say "No cloud"? What is the happy medium? Is all-in cloud too much?
- How is hunting vampires (and werewolves) similar to looking for "cyber" threats?
- What is the best way to "Know your network", we all say this, but what are the best ways to accomplish this goal?
- Are we seeing the convergence of traditional IT and security? What are some of the most exciting trends you see in this area?
- What advice do you have for those folks listening in search of the following solutions:
- DDoS mitigation
- Threat Hunting
- User behavior analytics
- Vulnerability management
- Data Loss Prevention
- Three words to describe yourself.
- If you were a serial killer, what would be your weapon of choice?
- If you wrote a book about yourself, what would the title be?
- In the popular game of ass grabby-grabby, do you prefer to go first or second?
- Choose two celebrities to be your parents.
Security News - 7:00PM-8:00PM
- "Guest Diary
- Everything You Need To Know About Web Shells
- Drone operator arrested for flying over wildfire
- SeaWorld hacker and bomb hoaxer escapes prison sentence
- Alex Gibney on Stuxnet and why we need to talk about cyberwar
- Gotta Catch ‘Em All! – WORLDWIDE! (or how to spoof GPS to cheat at Pokémon GO) - Insinuator
- Is Cloud Computing Really Secure? A Pragmatic Approach
- Update now: Macs and iPhones have a Stagefright-style bug!
- Ransomware on the Cheap
- 15 Vulnerabilities in SAP HANA Outlined
- EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers
- The Mr. Robot Easter Egg Hunt Has Begun
- Bruce Schneier Joins The Tor Project
- Cisco Gives You Two Nasty Bugs To Fix Before The Weekend
- Hackers Claim Credit For Crashing Pokemon Go
- IoT Insecurity: Pinpointing The Problems
- The coolest US agency is starting a ‘revolution’ to get rid of computer viruses
- WikiLeaks under 'sustained attack' after announcing release of Turkey docs - CNET
- IoT spurs surprise surge in assembly language popularity | InfoWorld
- Criminals plant banking malware where victims least expect it | Ars Technica