Security Weekly - A CRA Resource
Security Weekly - A CRA Resource
  • Видео 5 434
  • Просмотров 2 721 384
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, Aaran Leyland, and More... - SWN #403
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, I try to be more succinct, Aaran Leyland, and More on the Security Weekly News.
Visit www.securityweekly.com/swn for all the latest episodes!
Show Notes: securityweekly.com/swn-403
Просмотров: 375

Видео

Funding, Cato, Code42, DoS Robots, and Blackhat Prep - ESW #370
Просмотров 77День назад
This week, in the enterprise security news, 1. over half a billion in funding, as everyone gets their pre-Blackhat announcements out! 2. Mimecast picks up Code42 3. Will Cato Networks IPO? 4. Canarytokens update 5. We still have some crowdstrike fallout to discuss 6. CISO responses to SEC rules 7. Making things secure without security tools 8. tips for going SOCLess 9. denial of service robots ...
10 Security Researcher Qualities Marketers Should Adopt - Dani Woolf - ESW #370
Просмотров 67День назад
There's plenty of content out there detailing how vendors fall short: - scummy, aggressive sales tactics - overuse of jargon and buzzwords - sneaky sales tactics - dumping on competitors - products that fall far short of claims - ambulance chasing So what *should* they doing? In this episode, we chat with Dani Wolff, about how marketers can adopt the skills and mindsets of security researchers ...
Cybersecurity's Love Affair with Distractions - Fred Wilmot - ESW #370
Просмотров 54День назад
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized network access? Why do we keep thinking that the...
It's Always DNS - PSW #837
Просмотров 195День назад
Hacking traffic lights (for real this time), the Docker API strikes again, access Github deleted data, using EDR to elevate privileges on Windows, computers I need in my life, failed experiments and Raspberry PI access points, sitting ducks and TuDoor - its always DNS times 2, null sessions and a blast from the past, chaining UEFI vulnerabilities, pirates exposed, revoking SSL certificates, and...
PK Fail - John Loucaides - PSW #837
Просмотров 129День назад
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Visit www.securityweekly.com/psw for all the latest episod...
The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35
Просмотров 107День назад
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit securityweekly.com/eclypsium to learn more about them! Resource: cisa.gov/kev Show Notes: securityweekly.com/bts-35
Forever mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More... - SWN #402
Просмотров 391День назад
Forever Mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More, on this Edition of the Security Weekly News. Visit www.securityweekly.com/swn for all the latest episodes! Show Notes: securityweekly.com/swn-402
A CISO's Perspective on AI, Appsec, and Changing Behaviors - Paul Davis - ASW #293
Просмотров 112День назад
A CISO's Perspective on AI, Appsec, and Changing Behaviors - Paul Davis - ASW #293
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
Просмотров 74День назад
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
Identity Security Posture Management - Dor Fledel - BSW #358
Просмотров 193День назад
Identity Security Posture Management - Dor Fledel - BSW #358
The Evolving Role of the CISO - Allan Alford - BSW #358
Просмотров 106День назад
The Evolving Role of the CISO - Allan Alford - BSW #358
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
Просмотров 357День назад
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
AI Ruining the Internet, Crowdstrike Post Mortem, Wiz Walks - ESW #369
Просмотров 321День назад
AI Ruining the Internet, Crowdstrike Post Mortem, Wiz Walks - ESW #369
Can the latest wave of AI innovation deliver for security operations teams? - ESW #369
Просмотров 102День назад
Can the latest wave of AI innovation deliver for security operations teams? - ESW #369
Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch - ESW #369
Просмотров 109День назад
Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch - ESW #369
MS Patch Tuesday: Which Vulnerabilities Really Need Prioritizing. - Douglas McKee - PSW #836
Просмотров 229День назад
MS Patch Tuesday: Which Vulnerabilities Really Need Prioritizing. - Douglas McKee - PSW #836
Crowdstrike: The Aftermath - PSW #836
Просмотров 1,3 тыс.День назад
Crowdstrike: The Aftermath - PSW #836
Where Generative AI Can Actually Help Security (And Where It Doesn't) - Allie Mellen, ... - ASW #292
Просмотров 2012 дня назад
Where Generative AI Can Actually Help Security (And Where It Doesn't) - Allie Mellen, ... - ASW #292
SAPwned, Squarespace Domain Hijacks, AIs Fixing Code, Infosec Investments - ASW #292
Просмотров 732 дня назад
SAPwned, Squarespace Domain Hijacks, AIs Fixing Code, Infosec Investments - ASW #292
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
Просмотров 3992 дня назад
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
Risk Management Insights: What CEOs and Boards Really Need - Jeff Recor - BSW #357
Просмотров 992 дня назад
Risk Management Insights: What CEOs and Boards Really Need - Jeff Recor - BSW #357
Closing CISO-CEO Communication Gap Requires a Common Business Language - Sumedh Thakar - BSW #357
Просмотров 3322 дня назад
Closing CISO-CEO Communication Gap Requires a Common Business Language - Sumedh Thakar - BSW #357
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
Просмотров 552 дня назад
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
Analyzing the CrowdStrike Outage and Its Ripple Effects - SWN #399
Просмотров 2,3 тыс.14 дней назад
Analyzing the CrowdStrike Outage and Its Ripple Effects - SWN #399
Rumored Wiz Deal Would be HISTORIC (if it happens), redefining shared responsibility - ESW #368
Просмотров 17714 дней назад
Rumored Wiz Deal Would be HISTORIC (if it happens), redefining shared responsibility - ESW #368
What's wrong with the cybersecurity industry and what we can do about it - Richard Hollis - ESW #368
Просмотров 17114 дней назад
What's wrong with the cybersecurity industry and what we can do about it - Richard Hollis - ESW #368
Book Discussion: Jump-start Your SOC Analyst Career - Jarrett Rodrick, Tyler Wall - ESW #368
Просмотров 12814 дней назад
Book Discussion: Jump-start Your SOC Analyst Career - Jarrett Rodrick, Tyler Wall - ESW #368
Vulnerability Chains - PSW #835
Просмотров 24414 дней назад
Vulnerability Chains - PSW #835
3D Printing For Hackers - David Johnson - PSW #835
Просмотров 30114 дней назад
3D Printing For Hackers - David Johnson - PSW #835

Комментарии

  • @SFDestiny
    @SFDestiny День назад

    jackbooted thugs? so you're on the side of the DDOS

  • @n0rbert79
    @n0rbert79 День назад

    I am leaving a comment for the RUclips algorithm. Hello and hope you have a lovely day. :)

  • @abhispark
    @abhispark 2 дня назад

    Great session, learnt good ways of threat modelling.

  • @SandraWambold
    @SandraWambold 3 дня назад

    The Sneakers t-shirt is indeed very nice.

  • @paulbradbury5792
    @paulbradbury5792 3 дня назад

    Isn't true generative AI most beneficial if we can't predict the end result?

  • @greenaum
    @greenaum 7 дней назад

    "Doom for Windows 3.1"

  • @thinkpad4
    @thinkpad4 9 дней назад

    That quote is from Armageddon said by Steve Buscemi

  • @ScottBrown-zz4sk
    @ScottBrown-zz4sk 10 дней назад

    Aryon land 😅👍

  • @bretthagey7916
    @bretthagey7916 10 дней назад

    Is CrowdStrike speaking at your convention? ;-)

  • @aymanaljewzi8308
    @aymanaljewzi8308 11 дней назад

    it's really great

  • @michaelrodriguez5828
    @michaelrodriguez5828 13 дней назад

    Darktrace is a leader in this space, check us out!

  • @AllisonJudge-v7n
    @AllisonJudge-v7n 13 дней назад

    This episode is so timely, considering ... 😬

  • @donjaksa4071
    @donjaksa4071 13 дней назад

    NIST 800-14 General guidelines for Secure software applications I bet the next security audit is going to be brutal - We are effectively synergizing backward outflow for upward revenue stream dynamics REMEMBER BASELINE CONTROLS SATISFY REQUIREMENTS

  • @jamespong6588
    @jamespong6588 14 дней назад

    Updating the kernel daily without testing, using cheap labor? what can go wrong?

  • @jood-r8l
    @jood-r8l 15 дней назад

    Good to hear that about team work. Thanks

  • @fbimartybyrde7810
    @fbimartybyrde7810 15 дней назад

    error when importing the module, could you explain it? Import-Modul.\Mailsniper.ps1 : The term 'Import-Modul.\Mailsniper.ps1' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. At line:1 char:1 + Import-Modul.\Mailsniper.ps1

  • @1badchevellefan
    @1badchevellefan 15 дней назад

    Awesome episode!!!!

  • @brucelind3678
    @brucelind3678 16 дней назад

    Tyler is missing something in blaming customer when okta support explicitly states don't upload passwords.. what happens when a customer asks for help to remove passwords.. Often, support isn't going to be helpful.. when that happens the requirement to remove becomes unsupportable as a way to remove responsibility from Okta.

    • @tylerxshields
      @tylerxshields 14 дней назад

      Excellent point! I think the key is setting expectations (whatever they are) and then living up to those expectations. It's when the line is blurry that ownership becomes difficult. We also have to look at the expectations (the line being drawn) and reevaluate it periodically to make sure that it's well designed over time. Thanks for commenting!

    • @AdrianSanabria
      @AdrianSanabria 14 дней назад

      IMO, it's all on Okta - they required customers to do something that 99% of their customers weren't going to be able to do. And the fact that no one reads instructions in the US lifts that percentage to 100%. On top of all that, they were leaving themselves open to liability, made them an attractive target, and it bit them, HARD.

  • @Darnetheous
    @Darnetheous 16 дней назад

    Speedway gas stations were also done. Some smaller stations were cash only in ohio

  • @davidbrattain1446
    @davidbrattain1446 16 дней назад

    Maybe its time for IBM to take the lead and provide closed systems for critical infrastructure and captured servers running Linux with mainframe backends. The cloud and Microsoft along with connectionless protocols (IP) are not really suited for critical systems. BTW-VPN will not save you. Devops is death for these systems as well.

  • @gand0rfTRZ
    @gand0rfTRZ 16 дней назад

    Love listening to you!! I work for Amazon Transportation Department. Most sites in North America are still able to send stuff out via trucks. Most of the issues we faced was workstations with BSOD, but there are was around the system to get trucks in and out. At least for those of us who have been around for a while and recall doing things before automation was put in.

  • @edgewood99
    @edgewood99 16 дней назад

    The "workaround" is there and very easy. There is no reason to "PANIC"...if the servers are repaired...(by deleting a bunch dumb .sys files) and restarting. It takes a minute.

  • @bugperson04
    @bugperson04 16 дней назад

    how do you “beta test” something that is used throughout all major industries. complete incompetence on MS.

  • @TheCrystallineAnunna
    @TheCrystallineAnunna 17 дней назад

    I worked IT for almost 20 years. I feel for ALL of the poor agents having flipped out customers. All the best folks. I hope this is not some kind of "test run"? 🤔

  • @NimbleSF
    @NimbleSF 17 дней назад

    Great video on this!

  • @svensubunitnillson1568
    @svensubunitnillson1568 17 дней назад

    i had a feeling you would cover this! thanks

  • @tubbsthabarber4507
    @tubbsthabarber4507 17 дней назад

    6:46 I also got the Zero W deal on prime day! I’m wanting to try my hand at a Pwnagotchi or Pi-hole

  • @undeadpm4208
    @undeadpm4208 18 дней назад

    According to ‘Psychology’ fifth addition by Schacter, Gilbert, Nock, and Wegner, chapter 10: Emotional Intelligence is defined as the ability to reason about emotions and to use emotions to enhance reasoning. It is the type of intelligence that allows you to tell a friend that she talks too much without hurting their feelings, calm yourself down and cheer yourself up after a failed test, and recognizing whether you are angry or anxious. Emotional intelligent people know what kinds of emotions a situation will trigger; they can identify, describe, and manage their emotions; they know how to use their emotions to improve their decisions; and they can better identify other people’s emotions through facial expressions and tones of voice. This is very important for social relationships. They have better social skills and more friends, judged to be more competent in their interactions, and they have better romantic and workplace relationships. Emotional intelligent people tend to be happier and more satisfied with their lives. Emotional intelligence is one of the middle-level abilities that the data-based approach has missed.

  • @tubbsthabarber4507
    @tubbsthabarber4507 18 дней назад

    Had to listen to this podcast, rather than watch, out of solidarity for my Mavericks 😂

  • @michaelrawiri
    @michaelrawiri 18 дней назад

    Emotion is not.intelligence, intelligence requires logic

  • @justinledesma9633
    @justinledesma9633 18 дней назад

    Great stuff from NightWing listening to this. They understand the issues a lot of people talk about .

  • @AlgoNudger
    @AlgoNudger 19 дней назад

    Thanks.

  • @ahmedshaikh3438
    @ahmedshaikh3438 20 дней назад

    Ask Timothy what he's looking for. I am a beginner programmer looking to land a job in cybersecurity.

  • @gameratortylerstein5636
    @gameratortylerstein5636 23 дня назад

    His camera is a potato lolzz

  • @tubbsthabarber4507
    @tubbsthabarber4507 24 дня назад

    I am the new viewer. The one who didn’t know what SOHO meant. Thank you for the explanation 😂

  • @Hallic
    @Hallic 25 дней назад

    Cyborgs Unite! Great show, was a good watch.

  • @iceman1001
    @iceman1001 25 дней назад

    Thank you for having me on your show. It was a pleasure!

    • @SecurityWeekly
      @SecurityWeekly 24 дня назад

      Thank you for joining us! The pleasure was all ours 🤗

  • @arianneunityhargrave3384
    @arianneunityhargrave3384 26 дней назад

    You guys are amazing. Aaran was my inspiration to get into cyber. Now I’m an analyst. Today analyst, tomorrow ransomware Pinky.

  • @laincy-zp6lr
    @laincy-zp6lr 26 дней назад

    ı enjoyed the ıntro a lot

  • @brucelind3678
    @brucelind3678 27 дней назад

    Only get hands dirty with deep dives if directly relevant to current projects.. too many rabbit holes.. I pick ones that may have most value in as many different activities as possible

  • @luckynumbersevuuun
    @luckynumbersevuuun 28 дней назад

    40:00 boom, this is a boom moment in this excellent interview. the reason is that security requirements ARE product requirements, and they cant be treated like a separate set of requirements, they are engineering requirements and they need to be included in the overall planned engineering effort. so many times security is an afterthought, consider the length and frequency of the CISA alert list. The engineers must own their requirements, including the security requirements, so we've found methods to improve this by compelling leadership to insist that security requirements are planned and not foisted on engineers as extra work. product management must lead and set the tone for this, and program management must step up and start tracking everything security related, as well. secondly, the good-engineer is delighted to see me, because i represent a body of knowledge that can only be gained through experience, and our advisement and insights are invaluable, esp when considering the broad range of inexperienced, or rather, "specialized" engineers that companies employ today. it takes only one ill-managed moment to assign the wrong task to an engineer not well-prepared for it, and this may introduce defects that result in loss of human lives. to avoid that, we must build product security teams that operate pen-test labs continously testing releases. we must introduce hands-on security-focused attacker-mindset engineering concepts for the engineers, and we must have leeadership understanding that they must aquire a technical security vocabulary and use it. directors and above should have security leadership training, and should get it from outside the org, like from SANS or something other than their own intenral groups. also, the security team should report outside the engineering management chain, and significantly higher in the chain than the lowest engineering director. directors are typically failed engineers, but then again, what is a title. its all bs at the end of the day.

    • @securitypodcaster
      @securitypodcaster 27 дней назад

      Glad you enjoyed the interview and love all the points you made in your comments!

  • @inspitory8736
    @inspitory8736 Месяц назад

    So good to watch and learn about IDR. Thanks for your sharing your view Dave and we are implementing the same!

  • @Bhavana-wx9xt
    @Bhavana-wx9xt Месяц назад

    Bhavanasinghthapa halooo if weafgf more hoo

  • @Bhavana-wx9xt
    @Bhavana-wx9xt Месяц назад

    Bhavanasinghthapa nmaste . Do good and happy day.

  • @citizenq01
    @citizenq01 Месяц назад

    Everyone who works in IT has to know something about security. From the website designer who is building the forms, or setting up the eCommerce, to the janitor who is always on the look out for open doors, to the help desk agent who is setting GPO and changing passwords. To say only pentesters and SOCs are security is probably why organizations are so poorly trained, why the people on the front lines are constantly left out of the conversation, and why we keep losing. Utah? Where the data centers are? BTW, this video is poorly linked. I had to search for it. Part 2 is saying some really great stuff. More people should see it. Jeff, I love you man, but you're fixed on this notion (and I know devils advocate is your job as the host) that you or people exactly like you, are the only ones who can do this job because you've been in it so long. Yes, you have a unique perspective, but it's not the only perspective that matters or is helpful. People are born everyday that are (and are going to be) better than you, me, whoever. The world goes on whether we're in it or not. If we both got hit by a bus tomorrow cybersecurity goes on and someone will fill that position who probably comes from a far more impressive background because they had more resources to draw from than you did. When you started there was no this, this or that. When they started, there was.

  • @citizenq01
    @citizenq01 Месяц назад

    I know I'm 2 years late on this video, but what's striking is watching 2 guys refuse to believe that anyone else can do or even learn their job or any job related to security unless they've been around since before AOL chat rooms. I appreciate that you've been around since back in the day, you have much to teach. Teach and stop keeping a such a tight grip on the industry as if you're going to live forever, and when you do go, you're going to take it with you. How are all the old schoolers going to leave the industry? Better than they found it? Or are they going to work until they die and take it all with them? They have an opportunity to actually build the industry, organize it, and set it up for success for the protection of ALL OF US, rather than the rag tag, gatekeeping, dysfunction that it is now. True leaders leave a legacy that benefits generations.

  • @shubhamr8867
    @shubhamr8867 Месяц назад

    Does CTEM integrate EDR and MDR solutions in its framework?

    • @ZairaPirzada
      @ZairaPirzada 19 дней назад

      Hi @shubhamr8867, the CTEM framework speaks to two enabling technology forms: exposure management and exposure validation. These technologies, containing the range of tools like DRPS, VA, VPT, EASM, BAS, and more to help EDR & MDR to understand the potential exploits available to cyber adversaries to ensure high-grade detection and response. Actually, some elements of exposure assessment are already present in some EDR & MDR solutions, so it's increasingly acknowledged that CTEM strengthens and enhances EDR & MDR as a complement or embedded feature.

  • @db257c
    @db257c Месяц назад

    File transfer systems like MoveIt will always have a place as long as two bloated megacorps need to exchange data. You can, above a certain size, have a department that does nothing BUT that. Smol boys can get away with AWS Secure File Transfer Service (there's a reason it's expensive). Big boys have to deal with SFTP, FTPS, god help you regular FTP, and a handful of other transfer protocols in various configurations and directions. MoveIt et al fill that gap. Migrate off MoveIt specifically? Sure. But telling companies to just not move data via multiple protocols their partners use with a tool that brings some sanity to the world is like telling someone to just not breath on a Tuesday.