Yossi Sassi, Javelin Networks – Paul’s Security Weekly #580

Yossi Sassi is the Co-Founder and Cybersecurity Researcher at CyberArtSecurity.com. Yossi joins us for a tech segment to talk about using windows powershell, discussing DCSync, DCShadow, creative Event Log manipulation & thoughts about persistence…. Continue reading Yossi Sassi, Javelin Networks – Paul’s Security Weekly #580

Veronica Schmitt, DFIRLABS – Paul’s Security Weekly #580

Veronica Schmitt is the Sr. Digital Forensic Scientist for DFIRLABS. Veronica explains what SRUM is in WIndows 10. She explains how SRUM can be a valuable tool in Digital Forensics. Full Show NotesFollow us on Twitter: https://www.twitter.com/securityw… Continue reading Veronica Schmitt, DFIRLABS – Paul’s Security Weekly #580

John Walsh, CyberArk – Paul’s Security Weekly #579

John Walsh the DevOps Evangelist for CyberArk joins us on the show. John talks about the articles he wrote for CyberArk about Kubernetes, DevSecOps, and how to strengthen your container authentication with CyberArk. Sponsor Landing Page: www.conjur.org… Continue reading John Walsh, CyberArk – Paul’s Security Weekly #579

Omer Yair, Javelin – Paul’s Security Weekly #578

Omer is End-Point team lead at Javelin Networks. The team focuses on methods to covertly manipulate OS internals. Before Javelin Networks, he was a malware researcher at IBM Trusteer for two years focusing on financial malware families and lectured abo… Continue reading Omer Yair, Javelin – Paul’s Security Weekly #578

Offensive Operating Against SysMon, Carlos Perez – Paul’s Security Weekly #577

Carlos Perez delivers the Technical Segment on How to Operate Offensively Against Sysmon. He talks about how SysMon allows him to create rules, and track specific types of tradecraft, around process creation and process termination. He dives into netwo… Continue reading Offensive Operating Against SysMon, Carlos Perez – Paul’s Security Weekly #577

Threat Hunting in the Cloud, Apollo Clark – Paul’s Security Weekly #576

Apollo Clark goes through inventory management, access management, config management, patch management, automated remediation, logging and monitoring, and deployment tools. Full Show NotesVisit our website: http://securityweekly.com Follow us on Twitte… Continue reading Threat Hunting in the Cloud, Apollo Clark – Paul’s Security Weekly #576

Tracking Security Innovation – Business Security Weekly #99

Michael Santarcangelo joined by special guest Ron Gula from Gula Tech Adventures, talk with Chris Brenton about how do you take someone with a basic level certification and give them access to the tool? Full Show Notes
The post Tracking Security Innova… Continue reading Tracking Security Innovation – Business Security Weekly #99

Chris Brenton, ACM – Business Security Weekly #99

Michael Santarcangelo returns! Michael is joined by Matt Alderman and Ron Gula to interview Chris Brenton. They discuss what is threat hunting, what does this actually mean, is there a level of maturity required (organization, security team, individual… Continue reading Chris Brenton, ACM – Business Security Weekly #99

Bypassing PAM, Eyal Neemany – Paul’s Security Weekly #575

Eyal Neemany describes how to bypass Linux Pluggable Authentication Modules provide dynamic authentication support for applications and services in a Linux or GNU/kFreeBSD system. Eyal Neemany is the Senior Security Researcher for Javelin Networks. Ful… Continue reading Bypassing PAM, Eyal Neemany – Paul’s Security Weekly #575

Beacon Analysis, Chris Brenton – Paul’s Security Weekly #574

Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I’ll talk about what makes beacon… Continue reading Beacon Analysis, Chris Brenton – Paul’s Security Weekly #574