Difference between revisions of "Episode604"

From Security Weekly Wiki
Jump to navigationJump to search
Line 28: Line 28:
= Tech Segment:  - 6:30 - 7:30PM =
= Tech Segment: Bryson Bort, [https://securityweekly.com/scythe SCYTHE] - 6:30 - 7:30PM =
<!--[[File:PeterSmith.jpg|right|250px|thumb|<center>'''[https://twitter.com/LogRhythm Vaughn Adams]'''<br>is the Enterprise Sales Engineer at [[https://securityweekly.com/edgewise Edgewise]].</center>]] -->
<!--[[File:PeterSmith.jpg|right|250px|thumb|<center>'''[https://twitter.com/LogRhythm Vaughn Adams]'''<br>is the Enterprise Sales Engineer at [https://securityweekly.com/scythe SCYTHE].</center>]] -->

Revision as of 13:31, 18 April 2019

Recorded May 16, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor

  • Announcements

    • We just released our 2019 Security Weekly 25 Index Survey. Please go to securityweekly.com and click the Survey link to help us understand who's evaluating, using, or formerly used any of the Security Weekly 25 companies. The results will be summarized and presented back to all responders in a private webcast.

    Interview: Julian Zottl, Raytheon - 6:00-6:30PM

    Tech Segment: Bryson Bort, SCYTHE - 6:30 - 7:30PM

    Security News - 7:30PM-8:30PM

    Paul's Stories

    1. Microsoft plugs wormable RDP flaw, new speculative execution side channel vulnerabilities - Help Net Security
    2. Passwords Are Dead, Long Live The Password
    3. A flaw in Google Titan Security Keys expose users to Bluetooth Attacks
    4. Severe Linux kernel flaw found in RDS
    5. Microsoft Releases Security Updates to Address Remote Code Execution Vulnerability | US-CERT
    6. More Attacks against Computer Automatic Update Systems - Schneier on Security
    7. Google 0Day In the Wild project tracks zero-days exploited in the Wild

    Lee's Stories