Posts Tagged blue team

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

[podcast] Amanda Berlin, the art of the sale, and Malware droppers

[podcast] Amanda Berlin, the art of the sale, and Malware droppers

  “Always Be Closing” is the mantra that Alec Baldwin’s character “Blake” intones in the movie “#GlenGarry #Glen #Ross”. Ironically, the film about 4 men selling was a failure in the theaters. A lot of times as #blue #teamers, we find ourselves in the sights of a

Read more

[podcast] BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails

  This week, Mr. Boettcher found himself with an interesting conundrum concerning what happened when he converted a Windows DOCX file to a PDF using a popular #PDF converter software. We discuss what happened, how Software Restriction Policy in Windows kept him safe from a potential malware

Read more

[#podcast] Ben Johnson on company culture shifts, needing better job descriptions, assisting your company’s “cyber self-esteem”

http://traffic.libsyn.com/brakeingsecurity/2016-041-Ben_johnson.mp3     Ben Johnson from Carbon Black has been around the industry for a good while, and has seen a lot of ugly things in our industry. Ben had written a recent blog post (https://www.carbonblack.com/2016/08/12/benvlog-3-negative-forces-driving-security/) detailing the issues that seem to plague many companies and many

Read more

[podcast] Steps when scheduling a pentest, and the questions you forgot to ask… with Jarrod Frates

Jarrod Frates (@jarrodfrates on Twitter) has been doing pentests as a red-team member for a long time. His recent position at #InGuardians sees him engaging many companies who have realized that a typical ‘pentest #puppymill’ or pentest from certain companies just isn’t good enough. Jarrod has also

Read more

[podcast] DFIR conference, DFIR policy controls, and a bit of news

  Mr. Boettcher is back!  We talked about his experiences with the #DFIR conference, and we get into a discussion about the gap between when incident response is and when you’re using #digital #forensics. Mr. Boettcher and I discuss what is needed to happen before #incident #response

Read more

[podcast] Windows Registry, Runkeys, and where malware likes to hide

[podcast] Windows Registry, Runkeys, and where malware likes to hide

The Windows Registry has come a long way from it’s humble beginnings in #Windows 3.11 (Windows for Workgroups).  This week, we discuss the structure of the Windows Registry, as well as some of the inner workings of the registry itself. Did you know that it is contained

Read more

[podcast] Kim Green, on CISO-aaS, the Redskins Laptop, and HIPAA

  We are pleased to introduce Ms. Kim Green (Twitter: @kim1green). She is the CEO of KAZO Security, as well as the CISO / CPO of Zephyr Health, a #SaaS based #Healthcare data #analytics company.  She brings over 20 years of experience in healthcare and leadership to

Read more

[podcast] Earl Carter dissects the Angler Exploit Kit

[podcast] Earl Carter dissects the Angler Exploit Kit

Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the #Angler EK. He starts us off with a history or where it came from

Read more

[podcast] Carbon Black’s Ben Johnson: EDR and threat intel

[podcast]  Carbon Black’s Ben Johnson: EDR and threat intel

  Ben Johnson (@chicagoben on Twitter) has spent a good deal of time working on protecting client’s endpoints. From his work at the NSA, to being the co-founder of Carbon Black (@carbonblack_inc). Ben is co-founder and chief security strategist for Carbon Black. In that role, he uses

Read more

[podcast] Software Restriction Policies and Applocker

[podcast] Software Restriction Policies and Applocker

Windows has all the tools you need to secure an OS, but we rarely use them.  One example of this is ‘Software restriction policies’ or the use of Windows Applocker. It assists IT organizations by allowing you to block certain files from being saved anywhere, what file

Read more
Page 1 of 212

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel