From Security Weekly Wiki
Revision as of 19:50, 27 June 2019 by Wheat Loaf (talk | contribs) (Created page with "''Recorded July 25, 2019 at G-Unit Studios in Rhode Island!'' ==Episode Audio== <!-- <div align="center"> {{#widget:SoundCloud |id=496965687 |width=75% |height=100 |color=660...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Recorded July 25, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Interview: - 6:00-6:30PM

    Tech Segment: - 6:30 - 7:30PM

    Security News - 7:30PM-8:30PM

    Paul's Stories

    1. How to improve the hiring and retaining of infosec professionals? - Help Net Security
    2. Every minute, $2.9 million is lost to cybercrime - Help Net Security
    3. Answer These 9 Questions to Determine if Your Data Is Safe
    4. Fact vs Fiction: The Truth About Breach and Attack Simulation Tools | SecurityWeek.Com
    5. Crypto-Mining Botnet Implements BlueKeep Scanner | SecurityWeek.Com
    6. If youre struggling with Windows 10 migration, updates will be an even bigger challenge - Help Net Security
    7. Average data breach cost has risen to $3.92 million - Help Net Security
    8. InfoSec Handlers Diary Blog - May People Be Considered as IOC?
    9. How GDPR is Forcing the Tech Industry to Rethink Identity Management & Authentication
    10. When it comes to the IoT, Wi-Fi has the best security
    11. How IoT Opens the Door for Insider Attacks Against Industrial Infrastructure | SecurityWeek.Com
    12. Picture Perfect: How JPG EXIF Data Hides Malware - OpenDNS Umbrella Blog
    13. Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack
    14. U.S. Warns of 5G Wireless Network Security Risks | SecurityWeek.Com
    15. PKWARE contributing to the development of PCI Security Standards - Help Net Security
    16. Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens Forcefully
    17. Security or compliance? Stop choosing between them - Help Net Security
    18. Science Fiction Writers Helping Imagine Future Threats - Schneier on Security
    19. Rapper Who is Very Concerned with Password Security
    20. Security Considerations in a BYOD Culture
    21. Programmer from hell plants logic bombs to guarantee future work
    22. US Attorney General Says Encryption Creates Security Risk | SecurityWeek.Com

    Larry's Stories

    Lee's Stories