Technical Segment: Vulnerability Tracking & Reporting – Enterprise Security Weekly #58

Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!

The post Technical Segment: Vulnerability Tracking & Reporting – Enterprise Security Weekly #58 appeared first on Security Weekly.

Continue reading Technical Segment: Vulnerability Tracking & Reporting – Enterprise Security Weekly #58

Bypassing Input Filters with Sven Morgenroth, Netsparker – Paul’s Security Weekly #526

Your WAF is not safe! Sven Morgenroth, a Security Researcher at Netsparker, blows Paul’s mind with his ninja-esque input filter bypass skills in this technical segment! Full Show Notes Subscribe to YouTube Channel

The post Bypassing Input Filters with Sven Morgenroth, Netsparker – Paul’s Security Weekly #526 appeared first on Security Weekly.

Continue reading Bypassing Input Filters with Sven Morgenroth, Netsparker – Paul’s Security Weekly #526

Tech Segment: RITA, John Strand – Enterprise Security Weekly #55

John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly. Full Show Notes Visit http://securityweekly.com/esw for all the latest […]

The post Tech Segment: RITA, John Strand – Enterprise Security Weekly #55 appeared first on Security Weekly.

Continue reading Tech Segment: RITA, John Strand – Enterprise Security Weekly #55

Tech Segment: Monitoring Infrastructure with Nagios – Enterprise Security Weekly #54

Where do the lines blur between monitoring, configuration, and vulnerability management? What is the best way to monitor systems in an enterprise? How to you manage machine to machine trust? Answers to all those questions and more in this segment! Full Show Notes Visit

The post Tech Segment: Monitoring Infrastructure with Nagios – Enterprise Security Weekly #54 appeared first on Security Weekly.

Continue reading Tech Segment: Monitoring Infrastructure with Nagios – Enterprise Security Weekly #54

The Opportunity For Hardening Docker Containers – Enterprise Security Weekly #53

If you are a security professional who has not taken the plunge into Docker, this segment is for you! Paul highlights some of the configuration options available for Docker containers and how you can apply them to both your operating system and application hardening strategies.   ############################################################ # Dockerfile to build Nginx Installed Containers # […]

The post The Opportunity For Hardening Docker Containers – Enterprise Security Weekly #53 appeared first on Security Weekly.

Continue reading The Opportunity For Hardening Docker Containers – Enterprise Security Weekly #53

Detecting The Empire’s Death Star Attack – Paul’s Security Weekly #517

byt3bl33d3r recently released “DeathStar”, which uses Powershell Empire’s API to automatically obtain Domain Admin privileges in an Active Directory environment with the click of a button. Some may ask, “How do I detect and prevent this attack?” Tune in to this segment to find out how to use products available from Javelin Networks to do Continue reading Detecting The Empire’s Death Star Attack – Paul’s Security Weekly #517

Tech Segment: How Compromise Happens: Active Directory is Vulnerable – Paul’s Security Weekly #515

Almog Ohayon from Javelin Networks gives a demo on how compromises happen and counteract them. Full Show Notes http://traffic.libsyn.com/pauldotcom/Tech_Segment_How_Compromise_Happens_Active_Directory_is_Vulnerable_-_Pauls_Security_Weekly_515_converted… Continue reading Tech Segment: How Compromise Happens: Active Directory is Vulnerable – Paul’s Security Weekly #515

Windows Privilege Escalation Techniques (Local) – Tradecraft Security Weekly #2

In episode 2 of Tradecraft Security Weekly Beau Bullock (@dafthack) discusses Windows privilege escalation techniques. There are many reasons why normal employees should not be local administrators of their own systems. Network administrators tend to l… Continue reading Windows Privilege Escalation Techniques (Local) – Tradecraft Security Weekly #2

Tech Segment: Roi Abutbul and Guy Franco, Javelin Networks – Paul’s Security Weekly #513

Roi Abutbul and Guy Franco of Javelin Networks explain how to protect your active directory and deceive attackers in this technical segment! Full Show Notes Subscribe to YouTube Channel Security Weekly Website Follow us on Twitter: @securityweekly http… Continue reading Tech Segment: Roi Abutbul and Guy Franco, Javelin Networks – Paul’s Security Weekly #513

Tech Segment: Second Order Attacks with Ferruh Mavituna, Netsparker – Paul’s Security Weekly #512

Ferruh Mavituna of Netsparker gives a demo on exploiting application vulnerabilities and second order attacks in this technical segment! Full Show Notes Subscribe to YouTube Channel Security Weekly Website Follow us on Twitter http://traffic.libsyn.com… Continue reading Tech Segment: Second Order Attacks with Ferruh Mavituna, Netsparker – Paul’s Security Weekly #512