Listen in to Hurricane Labs\' InfoSec Podcast that will not only keep you entertained, but will also inform you about the latest InfoSec Hacks and Headlines, Hot Topic Talk, and Tip of the Week.
In today's podcast, we talk about the Cyber Safety Review Board and their report on Log4j. Also, make sure to check out some of the articles and resources mentioned during this episode: DHS Launches First-Ever Cyber Safety Review Board via Homeland Security Pentest Stories: Responsible vulnerability disclosure via Heather Terry & Dennis Goodlett How to Write a Vulnerability Management Policy by Roxy, Hurricane Labs Director of Compliance Keep an eye out for our upcoming blog posts about vulnerability management too! Click here for our podcast episode transcript.
Heather meets with Tom Kopchak to discuss strategies for organizations should utilize when creating cybersecurity training programs. In case you missed it, check out the first part of our Teaching and Learning Cybersecurity podcast series. Also, tune in to our related podcast: Addressing the Cybersecurity Skills Gap featuring Heather Terry, Tom Kopchak, Roxy, and Dusty Miller! Click here for our podcast episode transcript.
Heather meets with Tom Kopchak to reflect on his recent experiences teaching cybersecurity and on what skills are needed to help bridge the cybersecurity skills gap. Also, make sure to check out some of our related posts and podcasts: Addressing the Cybersecurity Skills Gap podcast featuring Heather Terry, Tom Kopchak, Roxy, and Dusty Miller Tom's Tips for Infosec Professionals blog post via Tom Kopchak A Guide to Success: 9 Career Tips for Infosec Newbies blog post via Kelsey Clark 5 Student Networking Strategies for Security Conferences blog post via Kelsey Clark Click here for our podcast episode transcript.
The Hurricane Labs team shares a few stories about their experiences with social engineering–and ways we can become more resilient to this type of attack. Also, make sure to check out some of the articles and resources mentioned during this episode: Verizon 2021 Data Breach Investigations Report Influence: The Psychology of Persuasion RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (Coming May 2!) Blog: How to reduce your organization's vulnerability to social engineering Click here for our podcast episode transcript.
Two of Hurricane Labs' team members red teamed for the NECCDC in March. They share insight to some of the strategies they used in their role as attackers. Also, make sure to check out some of the articles and resources mentioned during this episode: Northeast Regional of the Collegiate Cyber Defense Competition (NECCDC) NECCDC Red Team Review NECCDL / NECCDC Twitter Click here for our podcast episode transcript.
In this follow-up podcast, Heather chats with Hurricane Labs' Director of Security Operations about further security implications of the Russia-Ukraine conflict. Also, make sure to check out some of the articles and resources mentioned during this episode: SOC Talk: The Russia-Ukraine Crisis, Part 1 Statement by President Biden on our Nation's Cybersecurity (Full) Act Now to Protect Against Potential Cyberattacks – Security hardening recommendations via the Biden-Harris Administration President Signs New Executive Order Chartering Course New Course to Improve the Nation's Cybersecurity and Protect Federal Government Networks Backdoors & Breaches via Black Hills Information Security Russia Cyber Threat Overview and Advisories via CISA How to Run a Security Tabletop Scenario via Hurricane Labs Need help with your security? Contact us! Click here for our podcast episode transcript.
In today's podcast, our team discusses the value of VPNs–and a home firewall VPN project one of our analysts has set up. Click here for our podcast episode transcript.
In this podcast, Heather chats with two members of the Hurricane Labs SOC team about distributed denial of service (DDoS) attacks as well as how to identify, prevent, and mitigate these attacks. Also, make sure to check out some of the articles and resources mentioned during this episode: IT-ISAC GreyNoise Hurricane Labs Security Services Have questions for us? Get in touch with our team here! Click here for our podcast episode transcript.
In this special release podcast, Hurricane Labs' Director of Security Operations and our Director of Splunk Operations discuss the security implications of the Russia-Ukraine conflict. Also, make sure to check out some of the articles and resources mentioned during this episode: CISA Alert (AA22-047A) Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries via Kim Zetter, Substack Ukraine: Disk-wiping Attacks Precede Russian Invasion via Symantec Enterprise Blogs Click here for our podcast episode transcript.
In this podcast, Heather chats with the Hurricane Labs' SOC team about their favorite OSINT tools. Also, make sure to check out some of the articles and resources mentioned during this episode: Atomic Red Team Bitwarden CyberChef CyberChef for Splunk DNSdumpster Emailrep.io Machinae Ninoseki Privacy Tools Spiderfoot Splunk Attack Range Click here for our podcast episode transcript.
In this podcast, Heather and Roxy talk about the malware-laced USB devices being mailed to companies recently–and how you can stay safe. Also, make sure to check out some of the articles and resources mentioned during this episode: CISA: Using Caution with USB Drives FBI warns cybercriminals have tried to hack US firms by mailing malicious USB drives Ransomware warning: Cyber criminals are mailing out USB drives that install malware Click here for our podcast episode transcript.
In part two of this series, Heather chats with some of Hurricane Labs' security analysts about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Log4j: Letting the JNDI out of the bottle blog post by Tony Robinson 6 Practical Fraud Prevention Tips blog post by Roxy FTC warns companies to remediate Log4j security vulnerability blog post via the FTC FTC Warns Companies: Patch Log4j ASAP or Suffer Our Wrath blog post via Gizmodo Click here for our podcast episode transcript.
In part one of this two-part series, Heather chats with two of Hurricane Labs' pentesters about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Log4Shell Everywhere Log4Shell Detection with ZAP Two Nmap NSE scripts: NSE Log4Shell Other NSE Hurricane Labs' SOC Talk: IoT and Security Podcast OWASP ZAP – The Eval Villain Add-on Blog Post Making Easy DOM XSS Actually Easy with Eval Villain Hurricane Labs Penetration Testing Services Click here for our podcast episode transcript.
In this podcast, Heather chats with Tom, Meredith, and Roxy about ways to harden your wireless security. Also, make sure to check out our related blog post: 6 Tips for Wireless Security. Click here for our podcast episode transcript!
In this podcast, Heather chats with Tony, Kurt, and Josh about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Actual CVE-2021-44228 payloads captured in the wild Log4j – Apache Log4j Security Vulnerabilities Log4Shell Hell: anatomy of an exploit outbreak Splunk Security Advisory for Apache Log4j (CVE-2021-44228) Trending Internet Scanning on Apache Log4j Vulnerability Click here for our podcast episode transcript.
In today's podcast, Heather chats with Tom and Meredith about CISA's bad practices list and single-factor authentication. Click here for our podcast episode transcript.
In this podcast, Heather chats with Dennis, one of Hurricane Labs' pentesters, about how to avoid vulnerabilities ads inject into websites. Click here for our podcast episode transcript.
In today's podcast, Heather chats with Tom and Meredith about mitigating risks to your physical security. Click here for our podcast episode transcript.
In today's podcast, Heather chats with Hurricane Labs pentester Meredith about what the infosec community thinks of Apple's recent 0day disclosure troubles. Also, make sure to check out some of the articles mentioned during this episode: About the security content of iOS 12.5.5 Apple Releases Security Updates Pentest Stories: Responsible vulnerability disclosure Click here for our podcast episode transcript.
In the third and final part this series, the Hurricane Labs team talks about diversity in infosec–and how companies can support inclusivity within their organization. Click here for our podcast episode transcript.
In part 2 of this podcast series, the Hurricane Labs team talks about diversity in infosec–and how it impacts the workplace, the community, and the industry. Click here for our podcast episode transcript.
In part 1 of this podcast series, the Hurricane Labs team talks about diversity in infosec–and how it impacts the workplace, the community, and the industry. Click here for our podcast episode transcript.
In this podcast, Heather speaks with two of Hurricane Labs' Splunkers about machine learning's potential when paired with Splunk. Related articles: Exploratory Data Analysis for Anomaly Detection – Splunk Blogs Cyclical Statistical Forecasts and Anomalies – Splunk Blogs Welcome to the Machine Learning Toolkit – Splunk Docs Machine Learning Crash Course – Google Developers Click here for our podcast episode transcript.
In this podcast, Heather chats with members of Hurricane Labs' team about navigating security and IoT devices. Also, make sure to check out some of the resources mentioned during this episode: CloudFree – Smart Home Devices Home Assistant – Open Source Home Automation California Passes Law That Bans Default Passwords in Connected Devices – TechCrunch Talk to Splunk with Amazon Alexa App – Splunkbase Talk to Splunk with Amazon Alexa – Splunk Blog Click here for our podcast episode transcript.
In this podcast, Heather talks with two of Hurricane Labs' pentesters about how they approach attacking a network and an application. If you're looking to get started with pentesting–or want to improve your skills–participating in CTFs is a great way to do that. Check out Roxy's informational blog-video combination to get a head start on setting up what you need to succeed! Click here for our podcast episode transcript.
In this podcast, Heather invites Hurricane Labs' team members Tom, Roxy, and Dusty to discuss the cybersecurity skills gap–and what both security professionals as well as learners can do to address the associated challenges. During the episode, Tom mentions the Global Collegiate Penetration Testing Competition (CPTC)–Tom has been involved in CPTC since its inception in 2015. If you're interested in learning more, or getting involved, we encourage you to check out the website or chat with Tom on Twitter at @tomkopchak. Click here for our podcast episode transcript.
In this podcast, Heather invites Hurricane Labs' Pentester Dennis Goodlett to chat about the obstacles he faced in his recent vulnerability disclosure experience. Click here for our podcast episode transcript.
On today’s show, Heather Terry chats with Steve McMaster, Brian Karrigan, Dusty Miller, and Austin O'Neil as they wrap up their discussion on designing a security operations center (SOC). In case you missed it, make sure to listen to Designing a SOC: Internal or External? Part 1. Click here for our podcast episode transcript.
On today’s show, Heather Terry welcomes a few members of the Hurricane Labs’ team–Steve McMaster, Brian Karrigan, Dusty Miller, and Austin O'Neil–to discuss the steps that go into establishing a SOC team, and what you'll want to consider when deciding whether your team will be internal or whether you'll work with a Managed Security Services Provider (MSSP). Also, make sure to check out some of the resources mentioned during this episode: The Big 8: Supercharging Your SIEM with the Right Data Types by Hurricane Labs White Paper on Using Metrics to Mature Incident Response Capabilities by Mandiant Click here for our podcast episode transcript.
In this podcast, Heather chats with Vulnerability Management Specialist Roxy and SOC Analyst Dusty about the security best practices concerns at play in the recent water plant breach. Related articles: Florida Water Plant Hack: Leaked Credentials Found in Breach Database Breached water plant employees used the same TeamViewer password and no firewall Hacker breaks into Florida water treatment facility, changes chemical levels Click here for our podcast transcript.
Curious about the Collegiate Penetration Testing Competition (CPTC)? In this podcast, Heather welcomes Tom Kopchak, Josh Neubecker, and Meredith Kasper to chat about their experiences working to bring the competition to life. Learn more about CPTC from Tom's blog posts and by visiting the CPTC website and Twitter profile: CPTC Review Part 1: The Setup, Part 2: The Ethics, Part 3: The Process, and Part 4: The Data blog series by Tom Kopchak How to Use the 2019 CPTC Security Dataset in Splunk tutorial by Tom Kopchak Explore the GlobalCPTC website Find @nationalcptc on Twitter Click here for a podcast transcript.
In this podcast, Heather chats with Roxy, our Vulnerability Management Specialist, and Bill Mathews, our Chief Technical Officer and owner of Hurricane Labs, about preparing vulnerability management policies. Be sure you check out some of the related resources mentioned during this episode: How to Write a Vulnerability Management Policy by Roxy NIST PCI SOC Click here for a transcript of our chat.
In this podcast, Heather welcomes Senior SOC Analyst Tony Robinson back for a follow-up discussion about the FireEye and SolarWinds breaches. Related resources: FireEye and SolarWinds Breaches Q&A with Senior SOC Analyst Tony Robinson by Heather Terry Security Advisory Regarding SolarWinds Supply Chain Compromise by Tony Robinson Security Advisory Regarding the Recent FireEye Breach Reports by Tony Robinson Click here for a transcript of our chat.
In this podcast, Heather welcomes Senior SOC Analyst Tony Robinson to talk about the FireEye and SolarWinds breaches in a Q&A. Be sure you check out some of the related resources mentioned during this episode: Security Advisory Regarding SolarWinds Supply Chain Compromise by Tony Robinson Security Advisory Regarding the Recent FireEye Breach Reports by Tony Robinson Click here for a transcript of our chat.
In part 2 of this podcast series, Heather Terry welcomes members of the Hurricane Labs SOC team, Brian Karrigan, Kurt Wolfe, and Meredith Kasper, to continue the discussion about the MITRE ATT&CK framework. This episode provides a few more details about what setting up the framework is like and what our team is excited about with MITRE as we move forward. Also, make sure you check out some of the related resources mentioned during this episode: MITRE ATT&CK Framework Q&A: What Red and Blue Teamers Should Know blog post by Meredith Kasper, Pentester, Hurricane Labs MITRE ATT&CK: Finding the Right Frame(work) for Your Map blog post by Brian Karrigan, SOC Analyst Tier II / Implementation, Hurricane Labs Man and Machine: A Look at Neurotechnology blog post by Jeremy Nenadal, Splunk Admin II, Hurricane Labs A Day in the Life of a SOC Architect blog post by John Blainer, SOC Analyst II, Hurricane Labs Hurricane Labs Careers – We are currently hiring for SOC and Splunk Development positions. Apply today! Click here for a transcript of our chat.
On today's show, Heather Terry welcomes Bill Mathews, Hurricane Labs' Owner and CTO, and Josh Silvestro, Hurricane Labs' SOC Tier II Team Lead, to discuss the MITRE ATT&CK framework. This conversation provides insight into what the framework is and its value to security teams. Also, make sure you check out some of the related resources mentioned during this episode: MITRE ATT&CK Framework Q&A: What Red and Blue Teamers Should Know blog post by Meredith Kasper, Pentester, Hurricane Labs MITRE ATT&CK: Finding the Right Frame(work) for Your Map blog post by Brian Karrigan, SOC Analyst Tier II / Implementation, Hurricane Labs Click here for a transcript of our conversation.
On today’s show, Heather Terry welcomes three members of the Hurricane Labs' SOC (security operations center) team to share a bit about their career journeys, to answer some of the infosec questions we’ve been asked via social media, and to talk about how they deal with burnout. Also, make sure to check out some of the resources mentioned during this episode: Building Virtual Machine Labs: A Hands-On Guide book by Tony Robinson, Senior Security Operations Analyst, Hurricane Labs 5 Insider Tips for Preventing Burnout in Cybersecurity blog post by Meredith Kasper, Pentester, Hurricane Labs MITRE ATT&CK Framework Q&A: What Red and Blue Teamers Should Know blog post by Meredith Kasper, Pentester, Hurricane Labs MITRE ATT&CK: Finding the Right Frame(work) for Your Map blog post by Brian Karrigan, SOC Analyst Tier II / Implementation, Hurricane Labs Click here for a transcript of the discussion.
In this podcast, Hurricane Labs Technical Writer Heather Terry, and VIP guest Hurricane Labs Director of Marketing Kelsey Clark, raise a toast to the Women in Tech 24-hour Virtual World Tour and chat about the highlights of their experience. Thanks for tuning in. Cheers! Also, make sure you check out some of the fabulous resources we mention on the episode: Women in Tech The S.H.E. Strategy 5 Things First-Time Virtual Conference Goers Should Know Click here for a transcript of our chat.
In this podcast, Hurricane Labs Technical Writer Heather Terry talks about her experience at the Technical Communication Summit of 2020. Read the episode here.
Welcome back to the Hurricane Labs Podcast for Splunk! Your podcast hosts on this episode are Kelsey, Tom, and Brian (somehow all of us are apparently very broken, but we've still managed to get a few thoughts out about Splunk). In this episode we will be discussing quite a few topics, including: [0:00 - 0:36 seconds] Time dedicated to our absolutely amazing host intros... [00:37 - 4:25 minutes]The Hurricane Labs in-house created Broken Hosts App for Splunk, because we don't want you to find out your data is missing before you go to search for it. You can find the app on the featured section of our very own Splunk Apps page. [4:26 - 9:18 minutes]Some of the cool new features that are a part of Splunk 7.1 (Note: there are a few things mentioned here that have either come and gone, or that Splunk has addressed since the recording of the podcast). We have also created a couple of related screencasts about Goodbye Changeme and an overview of what the 7.1 UI looks like. Make sure you check those out too. [9:19 - 17:10 minutes]Phantom - how it's helping security teams with automation and orchestration, and also why we're excited about it. [17:10 - 24:25 minutes]A few fun stories about Splunk's Annual Partner Symposium and then it pretty much goes downhill from there. Thanks for listening in! P.S. As Tom so nicely mentioned at the end, if you've been willing to put up with us for this podcast you should definitely do yourself a favor and check out our Splunk Tutorials Page and some of our other helpful resources on the Hurricane Labs website. Anddd we're on Twitter to, if that's your thing: @hurricanelabs. Thanks!
duh duh duhhhh the INTERNET OF THINGS *said in a loud, obnoxious wrestling announcer style voice* Podcast Topic (aka rant): On this episode Kelsey, Josh, Rob and Tim will be chatting (and yelling) about the Internet of Things... Kelsey's Disclaimer: Kelsey personally apologizes for any vulgar language that may occur during the podcast XD Are you asking some of the same questions below? Then pop in those earpods and listen in! Why would I possibly want a smartwatch? What in the heck does "IoT" actually mean? Why would I want my toaster on the Internet? What makes security different for IoT devices? We can't even secure printers tho...? Is the "convenience" worth the risk? Related articles and plugs: Nest App for Splunk Confessions of a Consumer IoT Skeptic Hacker Claims He Hacked 150,000 Printers to 'Raise Awareness' About Hacking The 'internet of things' will invade your home, whether you like it or not The Internet of Things: Five critical questions IoT Series: "Roxanne" App for Splunk If you have any thoughts, opinions, or just want to tell us how great you think we are, feel free to Tweet at us, leave us a comment on LinkedIn, Facebook, etc. And, as always, thanks for putting up with our shenanigans.
Hey Splunkers, it's been a while, but we're back! This is the Hurricane Labs Podcast for Splunk: Third Edition, and we're going to call this the "It's not magic, it's Splunk" segment. Your hosts on this podcast are Kelsey Clark (marketing person who no longer wants to host this particular podcast), Steve McMaster (SOC department lead), Tom Kopchak (Splunk admin department lead), and Tim Baldwin (who gets told what to do by Steve and Tom, is the only one who actually does any work, and is one of HL's Splunk engineers). ;) In this podcast, we'll be discussing Tim and Tom's .conf presentation highlights surrounding Splunk and monitoring, as well as conversing about new and upcoming features that connect with the admin side of things and also some of the improvements we're seeing on the security side of things. Disclaimer: We like to keep these podcasts interesting and informative, as well as realistic and down to earth; however, gotta toss it out there that we do NOT speak on the entire behalf of Hurricane Labs, nor do we speak on the behalf of Splunk>. We're here to discuss our thoughts surrounding Splunk and hope you can fish something (anything) useful out of our deep pool of knowledge. Oh, and if you are going to be around tomorrow at our big annual Information Security Summit, make sure you check out Tom and Steve's talk (it's Thursday after the keynote, so you should be caffeinated and ready to hear about how you can win at compliance!!! Woo!). See presentation details here. Feel free to Tweet us with any questions, thoughts, concerns, and/or other random things. You can find us on Twitter at @hurricanelabs, or if you need someone to yell at you can always find Kelsey at @unfoldmybrain too.
(...but really). Is ransomware the biggest threat in cybersecurity right now? Which side of the "to pay, or not to pay" argument do we land on? What does the future of ransomware look like? How do enterprises and users avoid this malicious software that locks down their critical business data? These and other questions (that are less ridiculous than the podcast title), will be discussed by Kelsey Clark (host and marketing person), Corey Ham (penetration tester), Tom Kopchak (doer of stuff and things), and Marc Fears (SOC team and first time podcaster!). This is Episode .09: The "Isn't ransomware hosted in Transylvania?" Episode. Listen if you dare... Articles of reference: A Short History & Evolution of RansomwareRansomware is now the biggest cybersecurity threatLA Hospital Hit By Ransomware Pays Hackers $17,000: Is It The Right Choice?FBI Reaffirms Stance Not to Pay Ransomware AttackersCanary in the ransomware mineCisco Talos Blog - Ransomware: Past, Present, and FutureCryptoworms: The future of ransomware hell Other shenanigans: Pittsburgh Splunk> User Group | Hurricane Labs"Splunkbuilders Association: Making Splunk ES Into Your Dream Home" blog post by Chris Crane"YARA: Incident Response Host Prioritization" blog post by Trevor Bammel"Gathering LDAP Identity Data with Splunk Cloud" blog post by Ryan O'Connor
Our big topic of discussion is Splunk Cloud - the good, the bad, and the ugly; we also cover some of the interesting features of Enterprise Security 4.0, including some things about Tim's favorite new feature; Cameron (CAMRON!) has *** Cameron's "Rant Sesh" Section***; Kelsey gets fired; and basically we have lots of opinions (as per usual) and a few REALLY amazing segues throughout our podcast. So, listen in to your hosts: Bill Mathews (@billford), Tim Baldwin, Cameron Schmidt, and Kelsey Clark (@unfoldmybrain), (if you dare...) for some authentic Splunk insights. Kelsey's Announcements: On the podcast Kelsey gives a quick review of the Hurricane Labs Cleveland and Pittsburgh Splunk> User Groups we hosted in February. We're also looking to improve these events moving forward, so if you have any cool ideas that are more hands-on and interactive, or topics will generally be advantageous to you as the user, feel free to reach out to Kelsey at kelsey@hurricanelabs.com. Other Notes: If you're in any of these locations in March, April, and/or May, you will be graced with our presence at a few of the upcoming SplunkLive! events: SplunkLive! Charlotte, March 29th, 2016SplunkLive! Altanta, April 21st, 2016SplunkLive! Chicago, May 5th, 2016 And, of course, check out Trevor Bammel's latest Splunk-savvy blog post: Splunk Geostats: Because Where in the World Is It?
So, what's really going on with the Apple-FBI encryption debate and what are the major concerns surrounding it? Also, did you hear about that hospital that was hit by ransomware? Interested in some "official" Hurricane Labs tips on how you can avoid this type of attack? Listen in! This is Hurricane Labs' InfoSec Podcast Episode .08: The "No, You Can't Close Pandora's Box" Edition, featuring Kelsey Clark (marketing person and list maker), Corey Ham (pen tester), Tom Kopchak (someone in charge of something), and Nathan Burrows (the thing Tom's in charge of). Show Articles: The war between the FBI and Apple just heated up againFAQ: Everything you need to know about Apple, encryption, and the FBIA Technical Perspective on the Apple iPhone CaseApple's Time Cook vs. the FBI, round two: "This case is about much more than a single phone"Ransomware Hackers A Bigger Threat Than Ever, Forcing Hospitals And Police To Pay Hostage FeesHollywood hospital coughs up 40 bitcoins to ransomware crooks
What can, or should, the Internet and Social Media companies do to fight terrorism? How do we wade through the murkiness of cyber defense and offense when it comes to war? What happened with the DDoS attack on the Internet's backbone and is it worth worrying about? This is Episode .07: The "Blurred Lines and the Murkiness of Cyberwar" Edition, featuring Kelsey Clark (Host and Marketing Person), Tom Kopchak (Doer of Stuff and Things), Rob Palcisko (Intern turned Full-Time Network Engineer); and Neil Madaczky (Splunk and The Webs). Show note articles: Terror on Twitter: How ISIS is taking war on social media - and social media is fighting back What Can - Or Should - Internet Companies Do To Fight Terrorism?New Bill Would Force Social Media Companies To Identify Potential Terrorists, Report Them To GovernmentPolitico's The Agenda Cyber Issue: America's Secret ArsenalAttack floods Internet root servers with 5 million queries per second It Works! Google's Quantum Computer is '100 Million Times Faster' than a PC
No, you can't magic data... But we will be talking about some things you can do with Splunk! Welcome to the first edition of the Hurricane Labs Podcast for Splunk, with your hosts Bill Mathews (@billford), Tim Baldwin, Ian Gillespie (@ianisgood), and Kelsey Clark (@k1clark). Topics of Discussion: Splunk 6.3 Release OverviewRelease Notes - Welcome to Splunk Enterprise 6.3 Our Splunk "Boos" and "Yays"Tim Baldwin's Related Blog Post - "Splunk All the Things: What will you see with 6.3?"Splunk IT Service Intelligence (ITSI App) Impact on the Internet of ThingsReal-Life Security Use Cases Best Practices and Approaches Side note... During our discussion about IoT, Fitbits, and exercise, we went on a thrilling tangent about "Zombies, Run!", which is an app that is supposed to simulate you being chased by zombies in order to help you during your running workout.Check out Hurricane Labs Splunk Apps: Download for free here Join our Splunk-savvy LinkedIn Group: Just Splunk IT! Thanks for tuning in!
This is Episode .06: The "Out of Sight and Beyond Oversight" Edition, featuring Kelsey Clark (Host), Corey Ham (Pen Tester), Tom Kopchak (Senior Security Engineer & Ops Team Lead), and first time podcaster John Haprian (Director of Technical Services). Episode .06 topics of discussion include: EMV stuff, Volkswagen probs, something about 'Whammies,' and more. Interested in keeping closer tabs on when our podcast episodes are released? Subscribe to our Weekly Beacon to catch all the top Hurricane Labs content, along with the best centralized collection of InfoSec Headlines, Software Updates, and General Tech Articles of the week. Subscribe here: https://beacon.hurricanelabs.com
This is Episode .05: The "Oh, so life really does have consequences..." Edition, featuring Kelsey Clark (Marketing Person), Corey Ham (Pen Tester), Tom Kopchak (Senior Security Engineer & Ops Team Lead), and Barton Yadlowski (Splunker & Data Scientist). Just a quick show note: Tom references a blog article he wrote a while back during the podcast, which is called "Watch Your Backdoors." So, check that out if you haven't already. Also, if you have any thoughts, comments, or ideas about topics you would like us to discuss on our podcast, feel free to reach out to Hurricane Labs on Twitter (@hurricanelabs) and Kelsey via email at kelsey@hurricanelabs.com. [Play Episode Below]
This podcast was recorded by the Hurricane Labs crew, and special guest Wolfgang Goerlich, at the 2015 Converge Conference. Topics of discussion (and witty banter) include: FBI anti-encryption rhetoric; the Hacking Team hack; Google's social responsibility; and more. Converge and BSides Detroit were fantastic - if you didn't get the chance to make it out this year, you can still view the video presentation recordings here: Converge 2015 Videos. Thanks to Wolf and all the sponsors, volunteers, speakers and everyone who made these conferences possible! Twitter and things... Wolfgang Goerlich - @jwgoerlichTom Kopchak - @TomKopchakNick Jacob - @MortiousPrimeCalvin Hedler - @001SPARTaN Kelsey Clark - @k1clarkHurricane Labs - @hurricanelabsConverge Detroit - @ConvergeDetroit
Featured Articles: OPM hack shines light on abysmal state of US federal system's security Why the Federal Government Sucks at Cyber SecurityNSA Has Reverse-Engineered Popular Consumer Anti-Virus Software In Order To Track UsersGoogle is Worse than the NSAWhy It's Worth Divorcing Information Security From IT[Play Episode Below]