Posts Tagged ISC2

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

[podcast] Amanda Berlin, the art of the sale, and Malware droppers

[podcast] Amanda Berlin, the art of the sale, and Malware droppers

  “Always Be Closing” is the mantra that Alec Baldwin’s character “Blake” intones in the movie “#GlenGarry #Glen #Ross”. Ironically, the film about 4 men selling was a failure in the theaters. A lot of times as #blue #teamers, we find ourselves in the sights of a

Read more

[#podcast] Ben Johnson on company culture shifts, needing better job descriptions, assisting your company’s “cyber self-esteem”

http://traffic.libsyn.com/brakeingsecurity/2016-041-Ben_johnson.mp3     Ben Johnson from Carbon Black has been around the industry for a good while, and has seen a lot of ugly things in our industry. Ben had written a recent blog post (https://www.carbonblack.com/2016/08/12/benvlog-3-negative-forces-driving-security/) detailing the issues that seem to plague many companies and many

Read more

[podcast] Steps when scheduling a pentest, and the questions you forgot to ask… with Jarrod Frates

Jarrod Frates (@jarrodfrates on Twitter) has been doing pentests as a red-team member for a long time. His recent position at #InGuardians sees him engaging many companies who have realized that a typical ‘pentest #puppymill’ or pentest from certain companies just isn’t good enough. Jarrod has also

Read more

[podcast] DFIR conference, DFIR policy controls, and a bit of news

  Mr. Boettcher is back!  We talked about his experiences with the #DFIR conference, and we get into a discussion about the gap between when incident response is and when you’re using #digital #forensics. Mr. Boettcher and I discuss what is needed to happen before #incident #response

Read more

[podcast] Windows Registry, Runkeys, and where malware likes to hide

[podcast] Windows Registry, Runkeys, and where malware likes to hide

The Windows Registry has come a long way from it’s humble beginnings in #Windows 3.11 (Windows for Workgroups).  This week, we discuss the structure of the Windows Registry, as well as some of the inner workings of the registry itself. Did you know that it is contained

Read more

[podcast] Earl Carter dissects the Angler Exploit Kit

[podcast] Earl Carter dissects the Angler Exploit Kit

Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the #Angler EK. He starts us off with a history or where it came from

Read more

[podcast] Carbon Black’s Ben Johnson: EDR and threat intel

[podcast]  Carbon Black’s Ben Johnson: EDR and threat intel

  Ben Johnson (@chicagoben on Twitter) has spent a good deal of time working on protecting client’s endpoints. From his work at the NSA, to being the co-founder of Carbon Black (@carbonblack_inc). Ben is co-founder and chief security strategist for Carbon Black. In that role, he uses

Read more

[podcast] Michael Gough, the ISSM model, and the 5 P’s

[podcast] Michael Gough, the ISSM model, and the 5 P’s

Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-013-michael_gough-the_5_Ps.mp3 iTunes: https://itunes.apple.com/us/podcast/brakeing-down-security-podcast/id799131292?mt=2 (look for the episode starting with “2016-013”) We discuss a model that Michael Gough used while he was at HP. The Information Security and Service Management (ISSM) Reference model can be used to help companies align their IS and IT goals with

Read more

[podcast] Ben Caudill on App Logic Flaws, and Responsible Disclosure”

[podcast] Ben Caudill on App Logic Flaws, and Responsible Disclosure”

Ever bought “-1” of an item on a retail site? Or was able to bypass key areas of an application and get it bypass authentication, or you were able to bypass a paywall on a site? This is only one example of a class of vulnerabilities called

Read more

Hector Monsegur, on being a reformed “Black Hat”

Hector Monsegur, on being a reformed “Black Hat”

Hector Monsegur has had a colorful history. A reformed black hat who went by the name ‘Sabu’ when he was involved in the hacker collectives “Lulzsec” and “Anonymous”, he turned state’s evidence for the FBI, working to stop further hacking attempts by the same people he was

Read more
Page 1 of 212

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel