Continue Reading... Hacker Culture Roundtable
Posted in Cyber Security

Hacker Culture Roundtable

Hacking is a term used to describe the activity of modifying a product or procedure to alter its normal function,…

Continue Reading... DevOps and Securing Applications – PSW #632
Posted in Cyber Security

DevOps and Securing Applications – PSW #632

– Given that DevOps is a process and its execution requires many different tools, how do we get started "doing…

Continue Reading... Security vs. Compliance – PSW #632
Posted in Cyber Security

Security vs. Compliance – PSW #632

It was once said that if Security and Compliance were in a relationship the status would be "It’s Complicated". This…

Continue Reading... A Decade of Hacks – Security Now 746
Posted in Cyber Security

A Decade of Hacks – Security Now 746

Top Security Stories of the Decade On this Eve of 2020, we look back over the hacks of the past…

Continue Reading... The State of Penetration Testing – PSW #631
Posted in Cyber Security

The State of Penetration Testing – PSW #631

Penetration testing has evolved quite a bit in the past year. As defenses shift, and in some cases get much…

Continue Reading... Blue Team Tactics and Techniques – PSW #631
Posted in Cyber Security

Blue Team Tactics and Techniques – PSW #631

It’s often said that attackers need only to get it right once, where defenders have to be right all of…

Continue Reading... Holiday Hack Challenge – PSW #631
Posted in Cyber Security

Holiday Hack Challenge – PSW #631

Each year the team at Counterhack Challenges makes available the Holiday Hack Challenge. Led by Ed Skoudis, and created by…

Continue Reading... Risk-Based Vuln. Mgmt/Threat & Vuln. Mgmt – Jason Rolleston, Michael Roytman – ESW #166
Posted in Cyber Security

Risk-Based Vuln. Mgmt/Threat & Vuln. Mgmt – Jason Rolleston, Michael Roytman – ESW #166

Jason Rolleston, Chief Product Officer at Kenna Security & Michael Roytman, Chief Data Scientist at Kenna Security join Paul, Matt,…

Continue Reading... 🔴 LIVE: Paul’s Security Weekly Christmas Party Extravaganza
Posted in Cyber Security

🔴 LIVE: Paul’s Security Weekly Christmas Party Extravaganza

This week, we present to you the Security Weekly Christmas Party Extravaganza! Here is a list of the Roundtable Discussions…

Continue Reading... The Joys Of Scoping – Steve Levinson – SCW #11
Posted in Cyber Security

The Joys Of Scoping – Steve Levinson – SCW #11

Steve Levinsonis the Vice President – Risk, Security & Privacy at Online Business Systems. Steve’s strong technical and client management…

Continue Reading... The Joys Of Scoping pt. 2 – Steve Levinson – SCW #11
Posted in Cyber Security

The Joys Of Scoping pt. 2 – Steve Levinson – SCW #11

Steve Levinsonis the Vice President – Risk, Security & Privacy at Online Business Systems. Steve’s strong technical and client management…

Continue Reading... Enterprise News – ESW #166
Posted in Cyber Security

Enterprise News – ESW #166

In the Enterprise News, we talk about how MITRE updates ATT&CK for the cloud, Ping Identity builds and matures Zero…

Continue Reading... Unify DevOps and SecOps – ESW #166
Posted in Cyber Security

Unify DevOps and SecOps – ESW #166

DevSecOps is all the rage, but what does it really mean? How do you achieve the integration of Security into…

Continue Reading... PlunderVolt – Security Now 745
Posted in Cyber Security

PlunderVolt – Security Now 745

This Week’s Stories: —  Google turns over 1500 users’ location data to catch Milwaukee arsonist —  Android’s Messenger app offers…

Continue Reading... December 17, 2019 – HNN #246
Posted in Cyber Security

December 17, 2019 – HNN #246

This week, Montana TV stations hit by cyber attack, Ransomware crisis in US schools, a deep dive into Phobos Ransomware,…

Continue Reading... Leadership Articles – BSW #156
Posted in Cyber Security

Leadership Articles – BSW #156

Why Crowdsourcing Often Leads to Bad Ideas, Transforming operations for successful cloud adoption, Do You Need Charisma to Be a…

Continue Reading... Securing the OT – Martin Bally – BSW #156
Posted in Cyber Security

Securing the OT – Martin Bally – BSW #156

Martin Bally is a highly accomplished senior global information security officer with more than 20 years of experience in multiple…

Continue Reading... API Security – Dave Ferguson – ASW #89
Posted in Cyber Security

API Security – Dave Ferguson – ASW #89

Dave Ferguson is the Director of Product Management, WAS at Qualys. Dave will discuss the issue of latent vulnerabilities and…

Continue Reading... Binary Planting, GitLab, and DevOps Pipelines – ASW #89
Posted in Cyber Security

Binary Planting, GitLab, and DevOps Pipelines – ASW #89

Binary Planting with the npm CLI is another way to describe one of our favorite attacks, GitLab Doles Out Half…

Continue Reading... Risks, Ransomware, Data Leaks, Oh My! – PSW #630
Posted in Cyber Security

Risks, Ransomware, Data Leaks, Oh My! – PSW #630

In the Security News, Reveton ransomware schemer stripped of six years of freedom, £270,000, and Rolex, Web-hosting firm 1&1 hit…

Continue Reading... Runtime Protection for Containers – Jorge Salamero – PSW #630
Posted in Cyber Security

Runtime Protection for Containers – Jorge Salamero – PSW #630

Jorge Salamero is the Director of Technical Marketing at Sysdig. Jorge enjoys playing with containers and Kubernetes, home automation and…