Continue Reading... Nemours Use Of RSA Archer To Manage Compliance Risk – Kevin Haynes – SCW #22
Posted in Cyber Security

Nemours Use Of RSA Archer To Manage Compliance Risk – Kevin Haynes – SCW #22

Customer perspective on the three topics discussed with RSA in first segment Also: -What is your view of security vs. compliance…

Continue Reading... Compliance Risk Challenges – David Walter – SCW #22
Posted in Cyber Security

Compliance Risk Challenges – David Walter – SCW #22

David Walter from RSA will join us to discuss the following: -The shift in the enterprise from compliance-based focused initiatives…

Continue Reading... Zoombombing, Zero Days, & Signal Sciences – SWN #21
Posted in Cyber Security

Zoombombing, Zero Days, & Signal Sciences – SWN #21

This week, Doug White brings you the latest news for this week, including Zoombombing, Zero Days at Microsoft, AI Takes…

Continue Reading... Real Leaders, Social Distancing, and Vendor Relationships – BSW #167
Posted in Cyber Security

Real Leaders, Social Distancing, and Vendor Relationships – BSW #167

In the leadership and communications section, Real Leaders: Abraham Lincoln and the Power of Emotional Discipline, Social Distancing: 15 Ideas…

Continue Reading... Protect Your Assets According to Their Value – Jeff Costlow – BSW #167
Posted in Cyber Security

Protect Your Assets According to Their Value – Jeff Costlow – BSW #167

How do you protect your assets commensurate with their value if you lack situational awareness of everything communicating on your…

Continue Reading... The Benefits of SAST and SCA in Your IDE – Utsav Sanghani – ASW #101
Posted in Cyber Security

The Benefits of SAST and SCA in Your IDE – Utsav Sanghani – ASW #101

Static application security testing (SAST) is critical for uncovering and eliminating issues in proprietary code. However, over 60% of the…

Continue Reading... Singularity: A Different Take on Container Security – Adam Hughes – ASW #101
Posted in Cyber Security

Singularity: A Different Take on Container Security – Adam Hughes – ASW #101

Singularity is a container runtime that was built from the ground up to live in multi-user environments where POSIX permissions…

Continue Reading... Remaining Home in Faith: LGBTQ Strength & COVID-19
Posted in Privacy and Data Rights

Remaining Home in Faith: LGBTQ Strength & COVID-19

HRC is hosting an interfaith service on perseverance among the LGBTQ community during the COVID-19 outbreak.

Continue Reading... Pwnd Ransomware | PwndLocker
Posted in Software Security

Pwnd Ransomware | PwndLocker

PwndLocker Ransomware has been hitting cities in the US with ransom demands over $400,000. This ransomware is decryptable: https://blog.emsisoft.com/en/35879/pwndlocker-ransomware-decryption-now-available/ —————————————-…

Continue Reading... COVID-19, SMBv3.11, & Drobo Exploit – Wrap Up – SWN #20
Posted in Cyber Security

COVID-19, SMBv3.11, & Drobo Exploit – Wrap Up – SWN #20

Pornhub has Italians singing from balconies, The Senate renews surviellance rules, Drobo hacks, Google Cloud bug bounties, all the show…

Continue Reading... Drobo Exploit, Docker Escape, SMBv3.11 – PSW #644
Posted in Cyber Security

Drobo Exploit, Docker Escape, SMBv3.11 – PSW #644

SANS Penetration Testing | Microsoft SMBv3.11 Vulnerability and Patch CVE-20200796 Explained, Drobo 5N2 4.1.1 – Remote Command Injection, $100K Paid…

Continue Reading... Work From Home Securely – Peter Smith, Edgewise – PSW #644
Posted in Cyber Security

Work From Home Securely – Peter Smith, Edgewise – PSW #644

The challenges and differentiated values of desktop and laptop protection and administrative tool control (e.g., Powershell, SSH) for remote users…

Continue Reading... Zen And The Art Of Logs In The Cloud – Corey Thuen – PSW #644
Posted in Cyber Security

Zen And The Art Of Logs In The Cloud – Corey Thuen – PSW #644

Struggling with how to get your logs from the cloud? Have no fear, Corey and the Security Weekly crew talk…

Continue Reading... HackTheBox – Tenten | Noob To OSCP Episode #24 (Reuploaded)
Posted in Software Security

HackTheBox – Tenten | Noob To OSCP Episode #24 (Reuploaded)

##I fixed an audio issue from the previous upload) We will complete Tenten, a ctf machine from hackthebox for learning…

Continue Reading... HackTheBox – Tenten | Noob To OSCP Episode #24
Posted in Software Security

HackTheBox – Tenten | Noob To OSCP Episode #24

We will complete Tenten, a ctf machine from hackthebox for learning offensive cyber security skills. You will learn: 1) Basic…

Continue Reading... The SMBGhost Fiasco – Security Now 758
Posted in Cyber Security

The SMBGhost Fiasco – Security Now 758

EARN IT is Evil, Free Coronavirus Services This Week’s Stories: —  Does Steve have coronavirus? Maybe? He got very sick…

Continue Reading... RSAC Micro Interview: Acunetix and Netsparker – Kevin Gallagher, Mark Ralls – ESW #176
Posted in Cyber Security

RSAC Micro Interview: Acunetix and Netsparker – Kevin Gallagher, Mark Ralls – ESW #176

Acunetix: Automation as a Solution for Web Application Security – Mark Ralls – RSAC 2020 Mark Ralls, President and Chief…

Continue Reading... RSAC Micro Interview – SaltStack and Synopsys – ESW #176
Posted in Cyber Security

RSAC Micro Interview – SaltStack and Synopsys – ESW #176

SaltStack: Managing Configuration & Patches with SaltStack – Mehul Revankar – RSAC 2020 Offering open-source and commercial solutions for configuration,…

Continue Reading... Enterprise News – ESW #176
Posted in Cyber Security

Enterprise News – ESW #176

Fortinet Introduces Self-Learning AI Appliance for Sub-Second Threat Detection Enterprise IT World, GreatHorn Offers Free Email Protection for 60 Days,…

Continue Reading... A holistic view of meeting compliance requirements – Part 2 – Matt Allen – SCW #21
Posted in Cyber Security

A holistic view of meeting compliance requirements – Part 2 – Matt Allen – SCW #21

Compliance requirements and SecOps frameworks like NIST – checking boxes rather than a ‘holistic’ view? The vendor eco-system feeding on…

Continue Reading... A holistic view of meeting compliance requirements – Part 1 – Matt Allen – SCW #21
Posted in Cyber Security

A holistic view of meeting compliance requirements – Part 1 – Matt Allen – SCW #21

Compliance requirements and SecOps frameworks like NIST – checking boxes rather than a ‘holistic’ view? The vendor eco-system feeding on…