Continue Reading... COVID, HHS, Android Phones, Nintendo – SWN #19
Posted in Cyber Security

COVID, HHS, Android Phones, Nintendo – SWN #19

Plague surveillance coming soon, the US government is worried about cryptocurrency, dbags attack the HHS, and new attacks on Android…

Continue Reading... Expert tips to deal with school closures and more | Internet Matters
Posted in Online Safety

Expert tips to deal with school closures and more | Internet Matters

As the Government announces the closure of schools to deal with the spread of coronavirus Dr Linda Papadopolous provides tips…

Continue Reading... CIA Pwns Well, Bluetooth Hacking, Lots of Ransomware, Apple Giving up Passwords? – SWN #12
Posted in Cyber Security

CIA Pwns Well, Bluetooth Hacking, Lots of Ransomware, Apple Giving up Passwords? – SWN #12

CIA pwns well, everyone in history, bluetooth hacking, Thousands of Docker Repositories are open to the internet, lots of ransomware,…

Continue Reading... Bottlerocket, Supply Chain Casualty, DevOps Sweet Spot – ASW #100
Posted in Cyber Security

Bottlerocket, Supply Chain Casualty, DevOps Sweet Spot – ASW #100

Data of millions of eBay and Amazon shoppers exposed as another supply chain casualty, Announcing Bottlerocket, a new open source…

Continue Reading... DevSecOps / Scaling Security – Clint Gibler – ASW #100
Posted in Cyber Security

DevSecOps / Scaling Security – Clint Gibler – ASW #100

Due to a combination of a) development teams embracing Agile and DevOps and b) that security teams are often outnumbered…

Continue Reading... Where the Law Thinks Your Data Lives – Steve Black – BSW #166
Posted in Cyber Security

Where the Law Thinks Your Data Lives – Steve Black – BSW #166

What data compliance regulations apply to a Las Vegas hospital with California patients? One major compliance fine can lead to…

Continue Reading... How to help kids spot fake news and misinformation | Internet Matters
Posted in Online Safety

How to help kids spot fake news and misinformation | Internet Matters

See our practical tips on how to help children spot fake news and avoid being misled into believing something that…

Continue Reading... Girls Who Hack and Secure Open Vote – Bianca Lewis – PSW #643
Posted in Cyber Security

Girls Who Hack and Secure Open Vote – Bianca Lewis – PSW #643

Girls Who Hack teaches classes primarily to middle school girls on hacking and making. Secure Open Vote is an end…

Continue Reading... Security Weekly News Wrap Up – SWN #18
Posted in Cyber Security

Security Weekly News Wrap Up – SWN #18

Biting other passengers on EU flights, Everyone is going to telecommute, NSO argues with Facebook in court of phone bugging,…

Continue Reading... Protecting Data on Employee 0wned PCs – Gabe Gumbs – PSW #643
Posted in Cyber Security

Protecting Data on Employee 0wned PCs – Gabe Gumbs – PSW #643

COVID-19, among other things, has deemed it necessary for many to work from home. There are several security concerns that…

Continue Reading... Connected devices security – Dorit Naparstek – PSW #643
Posted in Cyber Security

Connected devices security – Dorit Naparstek – PSW #643

Hacks performed on connected & IoT devices, such as routers, security cameras, smart meters, etc. are increasingly common, and revealing…

Continue Reading... The Fuzzy Bench – Security Now 757
Posted in Cyber Security

The Fuzzy Bench – Security Now 757

Hack the DoD, Telecommute for free This Week’s Stories: —  Microsoft, Google, LogMeIn & Cisco offer limited-time free use of…

Continue Reading... Categorization of Information Security – BSW #165
Posted in Cyber Security

Categorization of Information Security – BSW #165

How we breakdown the categories in information security. We look at the major areas of infosec and how they relate…

Continue Reading... Neustar, Fortinet, WatchGuard, Panda Security – ESW #175
Posted in Cyber Security

Neustar, Fortinet, WatchGuard, Panda Security – ESW #175

Neustar’s enhanced UltraDNS capabilities boast greater capacity, global reach and security, WatchGuard acquires Panda Security to expand endpoint capabilities, Ping…

Continue Reading... Drink all the booze, log all the things. – Corey Thuen – ESW #175
Posted in Cyber Security

Drink all the booze, log all the things. – Corey Thuen – ESW #175

The pain caused by bad pricing models in cybersecurity and analytics tools Visit https://www.securityweekly.com/esw for all the latest episodes! Show…

Continue Reading... RSAC Micro Interviews – ExtraHop and Bandura – Corey Bodzin, Todd Weller – ESW #175
Posted in Cyber Security

RSAC Micro Interviews – ExtraHop and Bandura – Corey Bodzin, Todd Weller – ESW #175

ExtraHop – Agents and logs don’t play well in an IoT environment, however the network doesn’t lie. Looking at the…

Continue Reading... HackTheBox – Popcorn | Noob To OSCP Episode #23
Posted in Software Security

HackTheBox – Popcorn | Noob To OSCP Episode #23

We will complete Popcorn, a ctf machine from hackthebox for learning offensive security skills. You will learn: 1) How to…

Continue Reading... Where do you Stand? Part 2 – Winn Schwartau – SCW #20
Posted in Cyber Security

Where do you Stand? Part 2 – Winn Schwartau – SCW #20

The goal of the show is to explore all the attitudes and impressions between security and compliance regardless of where…

Continue Reading... James Adams and the News – SWN #17
Posted in Cyber Security

James Adams and the News – SWN #17

Microsoft dumps legacy protocols, Whisper leaks all your secrets and ranks predators, malware developers unimpressed with Chrome 80, and James…

Continue Reading... Where do you Stand? – Winn Schwartau – SCW #20
Posted in Cyber Security

Where do you Stand? – Winn Schwartau – SCW #20

The goal of the show is to explore all the attitudes and impressions between security and compliance regardless of where…

Continue Reading... CISOs ready to move, How CISOs manage stress, and more! – BSW #165
Posted in Cyber Security

CISOs ready to move, How CISOs manage stress, and more! – BSW #165

In the leadership and communications section, CISOs who leave after 2 years may not finish what they start, Most CISOs…