Difference between revisions of "PSWEpisode636"

From Security Weekly Wiki
Jump to navigationJump to search
Line 60: Line 60:
== Paul's Stories ==
== Paul's Stories ==
== Larry's Stories ==
== Jeff's Stories ==
== Jeff's Stories ==
#[https://gizmodo.com/amazon-engineer-leaked-private-encryption-keys-outside-1841160934 Amazon Engineer Leaked Private Encryption Keys. Outside Analysts Discovered Them in Minutes]
#[https://gizmodo.com/amazon-engineer-leaked-private-encryption-keys-outside-1841160934 Amazon Engineer Leaked Private Encryption Keys. Outside Analysts Discovered Them in Minutes]
== Lee's Stories ==
== Tyler's Stories ==
== Doug's Stories ==
== Doug's Stories ==

Revision as of 14:42, 24 January 2020

Recorded January 23, 2020 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Doug White
    Cybersecurity professor, President of Secure Technology, and Security Weekly network host.
  • Tyler Robinson
    Managing Director of Network Operations at Nisos, Inc .

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Interview: Dug Song, Duo Security - 6:00-7:00PM

    Dug Songis the Co-founder & General Manager of Duo Security at CISCO

    Dug Song is Co-founder and General Manager of Duo Security, one of the fastest-growing cybersecurity providers in the world. In 2018, Duo was acquired by Cisco for $2.35 billion, making it the largest exit ever for a Michigan-based software company.
    Founded in 2010, Duo protects more than 20,000 organizations against data breach with its simple and easy two-factor authentication and Zero Trust security products.

    Dug has a history of leading successful products and companies to solve pressing security problems, and is a leading voice in the cybersecurity industry. Prior to launching Duo, Dug spent seven years as founding Chief Security Architect at Arbor Networks, protecting 80 percent of the world’s Internet service providers.

    Dug is heavily involved in mentorship and fostering entrepreneurship in Michigan. He is co-founder of the Ann Arbor’s Entrepreneurs Fund, which enables local entrepreneurs to turn business success into positive community impact. Dug is an executive board member of the University of Michigan’s Wallace House journalism fellowship program.

    Segment Description:

    • Part 1 - Introduction and Background
    1. How did you get your start in information security?
    2. Tell us about some of the software you worked on while still in school at the University of Michigan.
    3. What prompted you to begin work on dsniff?

    • Part 2 - Founder
    1. In 2000 you founded Arbor Networks, was that the point when you began to transition from engineer to entrepreneur?
    2. In the early PC days, some say Apple’s success was driven by the fact that they recruited business leaders (Jobs was known for his ability to talk to people, design things and his vision, not his technical prowess). The competition was largely being driven by hackers and computer nerds. What changed that allows hackers and engineers to move on to create successful tech companies?
    3. What did you learn from the experiences at Arbor Networks? What prompted you to move on to a different company?
    4. Why did you decide to found a company in the authentication space?
    5. When I think of Duo, I think of a company that has an outstanding culture, how do you continue to grow and maintain your vision and culture?

    • Part 3 - The Journey
    1. Cisco’s acquisition of Duo is, in my opinion, one of the greatest acquisitions in security, how did it come about and what was it like to be integrated into such a large company?
    2. What makes companies great? Some say great sales and marketing, others say great tech, but clearly, if you get any of those things wrong you are likely doomed for failure?
    3. What advice do you have for talented tech people that want to become entrepreneurs?
    4. What is your recommendation for an inspiring book for entrepreneurs? (Note: We are HUGE Wu-Tang fans)

    Segment Resources:

    Tech Segment: Mike Godwin, R Street Institute - 7:00PM-8:00PM

    Mike Godwinis the CEO & co-founder of R Street Institute.

    Michael Wayne Godwin is an American attorney and author. He was the first staff counsel of the Electronic Frontier Foundation (EFF), and he created the Internet adage Godwin's law and the notion of an Internet meme, as reported in the October 1994 issue of Wired. From July 2007 to October 2010, he was general counsel for the Wikimedia Foundation. In March 2011, he was elected to the Open Source Initiative board. Godwin has served as a contributing editor of Reason magazine since 1994. In April 2019, he was elected to the Internet Society board.[4] He is currently general counsel and director of innovation policy at the R Street Institute.

    Segment Resources:

    1. Tell us about the creation of the EFF: Why was it created and how did you become involved?
    2. What were some of the first cases taken on by the EFF? (In 1990 and into the 90s)
    3. Godwin's law? Please explain :) Still true today?
    4. Recently Sonos sent a notification to all customers stating that older equipment would not receive any new software updates, which likely includes security patches. What can we do to change this behavior to ensure the security of our devices (and our technology investments)?
    5. The right to repair provides us the liberty to reverse engineer devices, such as Sonos, especially when the software company refuses to support them? (Sonos also states older gear will not work with newer hardware and software from Sonos, perhaps Sonos files legal action if someone makes software to support older devices?)
    6. With large tech companies potentially controlling content (Amazon, Apple, Google), how do we ensure we will maintain free speech? And while speech may still be free, some have been banned from the aforementioned companies platforms because their views differ, how do we ensure a free and open Internet not governed by large corporations?

    Security News - 8:00-9:30PM

    Paul's Stories

    1. Cybersecurity Lessons Learned from 'The Rise of Skywalker'
    2. Brazil prosecutes Glenn Greenwald in attack on press freedom
    3. How to prep for Windows 7, Server 2008 end of life
    4. Multiple Vulnerabilities Found in AMD ATI Radeon Graphics Cards | SecurityWeek.Com
    5. NSA Offers Guidance on Mitigating Cloud Flaws
    6. Report: Saudi Crown Prince Personally Sent Malware to Jeff Bezos, Possibly to Steal Those Dick Pics
    7. Here Is the Technical Report Suggesting Saudi Arabias Prince Hacked Jeff Bezos Phone
    8. Microsoft Security Shocker As 250 Million Customer Records Exposed Online
    9. Sonos Makes It Clear: You No Longer Own The Things You Buy
    10. UN experts: Israeli spyware likely used in alleged Saudi hack of Bezos phone
    11. Quay Container Registry Quay

    Jeff's Stories

    1. Amazon Engineer Leaked Private Encryption Keys. Outside Analysts Discovered Them in Minutes

    Doug's Stories