Taking a look at the first 5 vulnerabilities in the OWASP Top 10 – 2017 list.
I speak with Kim Crawley about her recent article in Cylance, Security Certifications You Should Consider Getting, and about certifications in InfoSec in general.
I speak with Dr. Z. Cliffe Schreuders about a rather amazing project, the Security Scenario Generator (SecGen), which generates random vulnerable VMs!
I speak with Jason Haddix of Bugcrowd about the crowdsourcing of pen tests and growing the infosec community.
Scott Piper joins me this week to talk about detecting intruders on AWS.
This week I speak with J Cole Morrison about AWS Security and how IAM policies seem to be a lost art that are causing news headlines because of security breaches.
I speak with author Kyle Rankin about his latest book, Linux Hardening in Hostile Networks: Server Security from TLS to Tor.
I speak with Matt Domko about Bropy, a tool he built on top of Bro that offers infosec professionals an anomaly detection engine for network analysis.
I speak with Jonathon Poling about DFIR and what it entails.
I speak with security consultant Mark Kikta about red teams, their activities and all sorts of interesting aspects on how red teams help organizations build a stronger defence.
Equifax suffered one of the biggest breaches in history. I try to break down what happened and what we as Infosec professionals can learn from their mistakes.
In the conclusion of my 2 part interview with Archie Agarwal from ThreatModeler, we look at threat modeling outside of early design and architecture.
Part 1 of a 2 part discussion about threat modeling with Archie Agarwal, CEO of ThreatModeler.
The origin episode! I talk about what the podcast is about, where to find me, welcoming new users and a general overview of the podcast itself. Welcome!