Posts Tagged CPEs

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

[podcast] Steps when scheduling a pentest, and the questions you forgot to ask… with Jarrod Frates

Jarrod Frates (@jarrodfrates on Twitter) has been doing pentests as a red-team member for a long time. His recent position at #InGuardians sees him engaging many companies who have realized that a typical ‘pentest #puppymill’ or pentest from certain companies just isn’t good enough. Jarrod has also

Read more

[podcast] DFIR conference, DFIR policy controls, and a bit of news

  Mr. Boettcher is back!  We talked about his experiences with the #DFIR conference, and we get into a discussion about the gap between when incident response is and when you’re using #digital #forensics. Mr. Boettcher and I discuss what is needed to happen before #incident #response

Read more

[podcast] Earl Carter dissects the Angler Exploit Kit

[podcast] Earl Carter dissects the Angler Exploit Kit

Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the #Angler EK. He starts us off with a history or where it came from

Read more

[podcast] Carbon Black’s Ben Johnson: EDR and threat intel

[podcast]  Carbon Black’s Ben Johnson: EDR and threat intel

  Ben Johnson (@chicagoben on Twitter) has spent a good deal of time working on protecting client’s endpoints. From his work at the NSA, to being the co-founder of Carbon Black (@carbonblack_inc). Ben is co-founder and chief security strategist for Carbon Black. In that role, he uses

Read more

[podcast] Michael Gough, the ISSM model, and the 5 P’s

[podcast] Michael Gough, the ISSM model, and the 5 P’s

Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-013-michael_gough-the_5_Ps.mp3 iTunes: https://itunes.apple.com/us/podcast/brakeing-down-security-podcast/id799131292?mt=2 (look for the episode starting with “2016-013”) We discuss a model that Michael Gough used while he was at HP. The Information Security and Service Management (ISSM) Reference model can be used to help companies align their IS and IT goals with

Read more

[podcast] Ben Caudill on App Logic Flaws, and Responsible Disclosure”

[podcast] Ben Caudill on App Logic Flaws, and Responsible Disclosure”

Ever bought “-1” of an item on a retail site? Or was able to bypass key areas of an application and get it bypass authentication, or you were able to bypass a paywall on a site? This is only one example of a class of vulnerabilities called

Read more

Hector Monsegur, on being a reformed “Black Hat”

Hector Monsegur, on being a reformed “Black Hat”

Hector Monsegur has had a colorful history. A reformed black hat who went by the name ‘Sabu’ when he was involved in the hacker collectives “Lulzsec” and “Anonymous”, he turned state’s evidence for the FBI, working to stop further hacking attempts by the same people he was

Read more

[podcast] R-CISC Exec. Dir. Brian Engle, on threat intel

[podcast] R-CISC Exec. Dir. Brian Engle, on threat intel

We’ve reached peak “Br[i|y]an” this week when we invited our friend Brian Engle on to discuss what his organization does. Brian is the Executive Director of the Retail Cyber Intelligence Sharing Center – R-CISC. “Created by retailers in response to the increased number and sophistication of attacks

Read more

[podcast] History of DNS, DNS reconnaissance in pentests, and protecting your DNS infrastructure

[podcast] History of DNS, DNS reconnaissance in pentests, and protecting your DNS infrastructure

  DNS… we take it for granted… it’s just there. And we only know it’s broken when your boss can’t get to Facebook. This week, we discuss the Domain Naming System (DNS). We start with a bit of history, talking about the origins of DNS, some of

Read more

[podcast] Pentesting and Defending a Mainframe and Mainframe Security

This week’s super-sized episode is brought to us thanks to previous guest Cheryl Biswas. You might remember her from our “Shadow IT” (http:/brakeingsecurity.com/2015-048-the-rise-of-the-shadow-it) podcast a few months ago. She reached out to us to see if we were interested in doing a podcast on mainframe security with her and

Read more

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel