Episode 18 – Threat Hunting with Will Harmon

Episode 18 – Threat Hunting with Will Harmon

 
 
00:00 / 34:07
 
1X
 

Will Harmon from Trustwave’s Spider Labs comes to talk about Threat Hunting with me.

Episode 17 – A Look At The Treacherous Twelve From The CSA

Episode 17 – A Look At The Treacherous Twelve From The CSA

 
 
00:00 / 38:50
 
1X
 

I take a look at the Treacherous Twelve from the CSA to see what threats exist for people moving to the cloud.

Episode 16 – OSINT with Joe Gray from Advanced Persistent Security

Episode 16 – OSINT with Joe Gray from Advanced Persistent Security

 
 
00:00 / 1:00:47
 
1X
 

Joe Gray from the Advanced Persistent Security podcast and Through The Hacking Glass fame joins me to talk OSINT.

Episode 14 – OWASP Top 10 2017 – A6 Through A10

Episode 14 – OWASP Top 10 2017 – A6 Through A10

 
 
00:00 / 39:44
 
1X
 

In this episode I complete my review of the OWASP Top 10 – 2017 looking at items A6 (Security Misconfiguration) through A10 (Insufficient Logging & Monitoring).

Episode 013 – OWASP Top 10 2017 – A1 Through A5

Episode 013 – OWASP Top 10 2017 – A1 Through A5

 
 
00:00 / 34:17
 
1X
 

Taking a look at the first 5 vulnerabilities in the OWASP Top 10 – 2017 list.

Episode 011 – Security Scenario Generator with Dr. Z. Cliffe Schreuders

Episode 011 – Security Scenario Generator with Dr. Z. Cliffe Schreuders

 
 
00:00 / 40:38
 
1X
 

I speak with Dr. Z. Cliffe Schreuders about a rather amazing project, the Security Scenario Generator (SecGen), which generates random vulnerable VMs!

Episode 004 – A Day In The Life Of A Red Teamer With Mark Kikta

Episode 004 – A Day In The Life Of A Red Teamer With Mark Kikta

 
 
00:00 / 50:04
 
1X
 

I speak with security consultant Mark Kikta about red teams, their activities and all sorts of interesting aspects on how red teams help organizations build a stronger defence.

Episode 002 – Threat Modeling with Archie Agarwal – Part 2

Episode 002 – Threat Modeling with Archie Agarwal – Part 2

 
 
00:00 / 29:49
 
1X
 

In the conclusion of my 2 part interview with Archie Agarwal from ThreatModeler, we look at threat modeling outside of early design and architecture.