Continue Reading... McAfee Total Protection 2020 Test vs Malware
Posted in Software Security

McAfee Total Protection 2020 Test vs Malware

McAfee Total Protection 2020 Review: Test vs Malware (1500+ samples including ransomware, PUP etc.) How will the legendary Antivirus product…

Continue Reading... Hacker Culture Roundtable
Posted in Cyber Security

Hacker Culture Roundtable

Hacking is a term used to describe the activity of modifying a product or procedure to alter its normal function,…

Continue Reading... Security vs. Compliance – PSW #632
Posted in Cyber Security

Security vs. Compliance – PSW #632

It was once said that if Security and Compliance were in a relationship the status would be "It’s Complicated". This…

Continue Reading... DevOps and Securing Applications – PSW #632
Posted in Cyber Security

DevOps and Securing Applications – PSW #632

– Given that DevOps is a process and its execution requires many different tools, how do we get started "doing…

Continue Reading... A Decade of Hacks – Security Now 746
Posted in Cyber Security

A Decade of Hacks – Security Now 746

Top Security Stories of the Decade On this Eve of 2020, we look back over the hacks of the past…

Continue Reading... Blue Team Tactics and Techniques – PSW #631
Posted in Cyber Security

Blue Team Tactics and Techniques – PSW #631

It’s often said that attackers need only to get it right once, where defenders have to be right all of…

Continue Reading... The State of Penetration Testing – PSW #631
Posted in Cyber Security

The State of Penetration Testing – PSW #631

Penetration testing has evolved quite a bit in the past year. As defenses shift, and in some cases get much…

Continue Reading... Holiday Hack Challenge – PSW #631
Posted in Cyber Security

Holiday Hack Challenge – PSW #631

Each year the team at Counterhack Challenges makes available the Holiday Hack Challenge. Led by Ed Skoudis, and created by…

Continue Reading... Virginia Values Coalition Announces Legislation to Fight for LGBTQ Virginians
Posted in Privacy and Data Rights

Virginia Values Coalition Announces Legislation to Fight for LGBTQ Virginians

WATCH LIVE: HRC joins partners and leaders in Richmond, Virginia to highlight the importance of passing comprehensive protections for LGBTQ…

Continue Reading... 🔴 LIVE: Paul’s Security Weekly Christmas Party Extravaganza
Posted in Cyber Security

🔴 LIVE: Paul’s Security Weekly Christmas Party Extravaganza

This week, we present to you the Security Weekly Christmas Party Extravaganza! Here is a list of the Roundtable Discussions…

Continue Reading... Risk-Based Vuln. Mgmt/Threat & Vuln. Mgmt – Jason Rolleston, Michael Roytman – ESW #166
Posted in Cyber Security

Risk-Based Vuln. Mgmt/Threat & Vuln. Mgmt – Jason Rolleston, Michael Roytman – ESW #166

Jason Rolleston, Chief Product Officer at Kenna Security & Michael Roytman, Chief Data Scientist at Kenna Security join Paul, Matt,…

Continue Reading... Unify DevOps and SecOps – ESW #166
Posted in Cyber Security

Unify DevOps and SecOps – ESW #166

DevSecOps is all the rage, but what does it really mean? How do you achieve the integration of Security into…

Continue Reading... Enterprise News – ESW #166
Posted in Cyber Security

Enterprise News – ESW #166

In the Enterprise News, we talk about how MITRE updates ATT&CK for the cloud, Ping Identity builds and matures Zero…

Continue Reading... The Joys Of Scoping pt. 2 – Steve Levinson – SCW #11
Posted in Cyber Security

The Joys Of Scoping pt. 2 – Steve Levinson – SCW #11

Steve Levinsonis the Vice President – Risk, Security & Privacy at Online Business Systems. Steve’s strong technical and client management…

Continue Reading... The Joys Of Scoping – Steve Levinson – SCW #11
Posted in Cyber Security

The Joys Of Scoping – Steve Levinson – SCW #11

Steve Levinsonis the Vice President – Risk, Security & Privacy at Online Business Systems. Steve’s strong technical and client management…

Continue Reading... PlunderVolt – Security Now 745
Posted in Cyber Security

PlunderVolt – Security Now 745

This Week’s Stories: —  Google turns over 1500 users’ location data to catch Milwaukee arsonist —  Android’s Messenger app offers…

Continue Reading... Securing the OT – Martin Bally – BSW #156
Posted in Cyber Security

Securing the OT – Martin Bally – BSW #156

Martin Bally is a highly accomplished senior global information security officer with more than 20 years of experience in multiple…

Continue Reading... Leadership Articles – BSW #156
Posted in Cyber Security

Leadership Articles – BSW #156

Why Crowdsourcing Often Leads to Bad Ideas, Transforming operations for successful cloud adoption, Do You Need Charisma to Be a…

Continue Reading... December 17, 2019 – HNN #246
Posted in Cyber Security

December 17, 2019 – HNN #246

This week, Montana TV stations hit by cyber attack, Ransomware crisis in US schools, a deep dive into Phobos Ransomware,…

Continue Reading... Binary Planting, GitLab, and DevOps Pipelines – ASW #89
Posted in Cyber Security

Binary Planting, GitLab, and DevOps Pipelines – ASW #89

Binary Planting with the npm CLI is another way to describe one of our favorite attacks, GitLab Doles Out Half…

Continue Reading... API Security – Dave Ferguson – ASW #89
Posted in Cyber Security

API Security – Dave Ferguson – ASW #89

Dave Ferguson is the Director of Product Management, WAS at Qualys. Dave will discuss the issue of latent vulnerabilities and…