POPULARITY
On this episode of The Cybersecurity Defenders Podcast, we talk network threat hunting with Chris Brenton, COO at Active Countermeasures.Chris is a dedicated professional with a passion for simplifying the process of threat hunting. Chris is deeply committed to enhancing cybersecurity knowledge through delivering both free and affordable security training. Alongside this, he plays a crucial role in the development of both open-source and commercially accessible threat hunting tools. Whether you're aiming to sharpen your threat hunting skills or are looking to establish a robust threat hunting program within your organization, Chris is the go-to expert. Stay tuned as we dive deeper into his journey, and feel free to reach out to him directly to learn more or get involved.You can find Chris on LinkedIn here.And you can find Chris in Twitter here.
This is a special joint webcast from the teams of Black Hills Information Security, Wild West Hackin' Fest, and Active Countermeasures, presented by John Strand. In this webcast, we cover the recent wave of attacks we are seeing, and we cover some of the history that got us to where we are. Consider this to […] The post Webcast: New Wave of Ransomware Attacks: How did this happen? appeared first on Black Hills Information Security.
This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a good idea to throw a quick […] The post Webcast: Ok, Let’s Talk About Ransomware appeared first on Black Hills Information Security.
Open Web Application Security Project (OWASP) - Portland, Oregon Chapter
John Strand is our special guest today. He is the owner of Black Hills Information Security - a company that specializes in penetration testing and security architecture services. He is also cofounder of Active Countermeasures. He created the popular Backdoors and Breaches incident response card game. He wrote a book called Offensive Countermeasures (The Art of Active Defense). He can watch him along with other great guests on the Black Hills Information Security Podcast on YouTube.This podcast is sponsored by the We Hack Purple Academy.Links from the show:John's Twitter PageJohn's LinkedIn PageOffensive Countermeasures: The Art of Active Defense (book)Black Hills Information SecurityBlack Hills Information Security PodcastActive CountermeasuresBackdoors and Breaches GameDaftHack's Twitter PageN0BANDW1DTH's Twitter PageJohn Strand is interviewed by David Quisenberry and John L. WhitemanFollow us:HomepageTwitterMeetupLinkedInYouTube- Become an OWASP member- Donate to our OWASP PDX chapterSupport the show (https://owasp.org/supporters/)
Active Countermeasures (https://www.activecountermeasures.com/) , a firm dedicated to tracking advanced attackers inside and outside your network. John has consulted and taught hundreds of organizations in the areas of cybersecurity, regulatory compliance, and penetration testing. John is a contributor to the industry shaping Penetration Testing Execution Standard (http://www.pentest-standard.org/index.php/Main_Page) and 20 Critical Controls frameworks. He is also an experienced speaker, having done presentations to the FBI, NASA, the NSA, and at various industry conferences. John also co-hosts Offensive Countermeasures: The Art of Active Defense; (https://www.amazon.com/Offensive-Countermeasures-Art-Active-Defense-ebook/dp/B00DQSQ7QY) and writes loud rock music and makes various futile attempts at fly-fishing. In this episode, we discuss remote workers in the Covid-19 pandemic, validating VPN targets in pen tests, cloud security, developing SANS course material, how to choose what to give away, planning conferences, threat hunting, keeping up with new vulnerabilities, mental health, and so much more. Where you can find John: LinkedIn (https://www.linkedin.com/in/john-strand-a1b4b62/) Twitter (https://twitter.com/strandjs) BHIS Blog (https://www.blackhillsinfosec.com/blog/) Security Weekly Podcast (https://securityweekly.com/)
This is a joint webcast from Black Hills Information Security and Active Countermeasures. How many of us have tried some new configuration option, utility, or hardware on a production environment, […] The post Webcast: How to Build a Home Lab appeared first on Black Hills Information Security.
In this first of many SOC focused topics we jump into what is the core passion for both hosts, that of the SOC. We discuss in this episode about what is and our opinion on a tiered versus a tierless SOC model. As Exiled recently attended the free threat hunting course from Black Hills Information Security and Active Countermeasures he also offers a brief review of that course. We hope each of you get more information to continue to find badness.Support the show (https://www.patreon.com/bePatron?u=28069055)
Apple’s monitor stand stole the headlines from WWDC, but in this episode of Technado, Peter, Justin, and Don look at the conference’s less flashy announcements. Then, they talk with the COO of Active Countermeasures, Chris Brenton, about the state of threat hunting.
Apple’s monitor stand stole the headlines from WWDC, but in this episode of Technado, Peter, Justin, and Don look at the conference’s less flashy announcements. Then, they talk with the COO of Active Countermeasures, Chris Brenton, about the state of threat hunting.
Apple’s monitor stand stole the headlines from WWDC, but in this episode of Technado, Peter, Justin, and Don look at the conference’s less flashy announcements. Then, they talk with the COO of Active Countermeasures, Chris Brenton, about the state of threat hunting.
Apple’s monitor stand stole the headlines from WWDC, but in this episode of Technado, Peter, Justin, and Don look at the conference’s less flashy announcements. Then, they talk with the COO of Active Countermeasures, Chris Brenton, about the state of threat hunting.
Apple’s monitor stand stole the headlines from WWDC, but in this episode of Technado, Peter, Justin, and Don look at the conference’s less flashy announcements. Then, they talk with the COO of Active Countermeasures, Chris Brenton, about the state of threat hunting.
Apple’s monitor stand stole the headlines from WWDC, but in this episode of Technado, Peter, Justin, and Don look at the conference’s less flashy announcements. Then, they talk with the COO of Active Countermeasures, Chris Brenton, about the state of threat hunting.
This week, we welcome back Mary Beth Borgwing, President and Founder of of the Cyber Social Club, to talk about Uniting Women in Cyber! In the Technical Segment, we welcome back our friend Chris Brenton, Chief Operating Officer at Active Countermeasures, to discuss why threat hunting is the missing link between our protection tools and our response tools, and will take a deep dive into the AI Hunter! In the Security News, Attackers exploiting IMAP to bypass MFA on O365 and G-Suite accounts, Vietnam's OceanLotus Group Ramps up hacking car companies, UC Browser violates Google Play Store Rules, & how Russia is spoofing GPS Signals on a massive scale! To learn more about Active Countermeasures and to get the slides for the Technical Segment today, visit: https://securityweekly.com/acm Full Show Notes: https://wiki.securityweekly.com/Episode599 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome back Mary Beth Borgwing, President and Founder of of the Cyber Social Club, to talk about Uniting Women in Cyber! In the Technical Segment, we welcome back our friend Chris Brenton, Chief Operating Officer at Active Countermeasures, to discuss why threat hunting is the missing link between our protection tools and our response tools, and will take a deep dive into the AI Hunter! In the Security News, Attackers exploiting IMAP to bypass MFA on O365 and G-Suite accounts, Vietnam's OceanLotus Group Ramps up hacking car companies, UC Browser violates Google Play Store Rules, & how Russia is spoofing GPS Signals on a massive scale! To learn more about Active Countermeasures and to get the slides for the Technical Segment today, visit: https://securityweekly.com/acm Full Show Notes: https://wiki.securityweekly.com/Episode599 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
In the Technical Segment, we welcome back our friend Chris Brenton, Chief Operating Officer at Active Countermeasures, to discuss why threat hunting is the missing link between our protection tools and our response tools, and will take a deep dive into the AI Hunter! To learn more about Active Countermeasures and to get the slides for the Technical Segment today, visit: https://securityweekly.com/acm Full Show Notes: https://wiki.securityweekly.com/Episode599 Follow us on Twitter: https://www.twitter.com/securityweekly
In the Technical Segment, we welcome back our friend Chris Brenton, Chief Operating Officer at Active Countermeasures, to discuss why threat hunting is the missing link between our protection tools and our response tools, and will take a deep dive into the AI Hunter! To learn more about Active Countermeasures and to get the slides for the Technical Segment today, visit: https://securityweekly.com/acm Full Show Notes: https://wiki.securityweekly.com/Episode599 Follow us on Twitter: https://www.twitter.com/securityweekly
This week, Michael Santarcangelo returns! Michael and Matt Alderman interview Chris Brenton from Active Countermeasures. Then the Tracking Security Innovation segment with special guest Ron Gula from Gula Tech Adventures! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode99 Visit https://www.securityweekly.com/bsw for all the latest episodes!
This week, Michael Santarcangelo returns! Michael and Matt Alderman interview Chris Brenton from Active Countermeasures. Then the Tracking Security Innovation segment with special guest Ron Gula from Gula Tech Adventures! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode99 Visit https://www.securityweekly.com/bsw for all the latest episodes!
Join special guest Chris Brenton, COO of Active Countermeasures, as he discusses the anatomy of beacons and why you need to be looking for them during a threat hunt. He […] The post PODCAST: Beacon Analysis appeared first on Black Hills Information Security.
Today's episode is brought to you by my friends at Netwrix. Their amazing Netwrix Auditor tool gives you visibility into what’s happening both on your local network and cloud-based IT systems and tells you about critical changes, and when and where people have been accessing data. Give it a spin right in your browser here, and then try it in your environment free for 20 days! www.netwrix.com Well I'm geeking out big time because today I chatted with John Strand of Black Hills Information Security, SANS instructing, Security Weekly, Active Countermeasures, RITA and more. Some people think he looks like Wash from Serenity or Steve the Pirate from Dodgeball, and others get upset when they learn he's not John Strand the male model. I've followed John and his team's work since I got started in security, and they've been a huge inspiration for what I do at 7MS. If you're not watching the BHIS Webcasts stop what you're doing and subscribe now! They're all full of practical, hands-on security advice - often complemented by tools that are totally free! Anyway, enjoy today's interview where John and I talk about how to make pentesters' jobs harder, and why he'd rather be a security advisor to Katy Perry than Donald Trump.
This week, Paul and the crew sit down with Wim Remes, Founder and Principal Consultant at Wire Security! In our Technical Segment, we welcome back Chris Brenton, Chief Operating Officer for Active Countermeasures, in which he explains why Beacon Analysis in an integral part of threat hunting! In the Security News this week, Vulnerabilities found in remote management interface of Supermicro servers, Google fixes Chrome issue that allowed theft of WiFi logins, U.S. to charge North Korean spy over WannaCry and Sony Pictures hack, how to manipulate Apple’s podcast charts, and a Spanish driver that tests positive for every drug on the test. All that and more, on this episode of Paul’s Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode574 ** Link to slides for the Technical Segment can be found in the show notes! Visit https://www.securityweekly.com/psw for all the latest episodes! →Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!! →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul and the crew sit down with Wim Remes, Founder and Principal Consultant at Wire Security! In our Technical Segment, we welcome back Chris Brenton, Chief Operating Officer for Active Countermeasures, in which he explains why Beacon Analysis in an integral part of threat hunting! In the Security News this week, Vulnerabilities found in remote management interface of Supermicro servers, Google fixes Chrome issue that allowed theft of WiFi logins, U.S. to charge North Korean spy over WannaCry and Sony Pictures hack, how to manipulate Apple’s podcast charts, and a Spanish driver that tests positive for every drug on the test. All that and more, on this episode of Paul’s Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode574 ** Link to slides for the Technical Segment can be found in the show notes! Visit https://www.securityweekly.com/psw for all the latest episodes! →Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!! →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
Join John Strand as he continues his Attack Tactic series this time with the defense ideas for the attacks mentioned in episode 3 (see more here) To see the entire […] The post PODCAST: From Active Countermeasures – Attack Tactics 4 appeared first on Black Hills Information Security.
Chris has been a leader in IT and security for over 20 years. He has written multiple books on networking and security including "Mastering Cisco Routers" and "Mastering Network Security". Full Show Notes: https://wiki.securityweekly.com/ES_Episode95 Visit http://securityweekly.com/esw for all the latest episodes!
This week, Paul and John welcome Chris Brenton, Chief Operating Officer of Active Countermeasures! In the Enterprise News, we have updates from Riverbed, Tufin, ServiceNow, Splunk, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode95 Visit https://www.securityweekly.com/esw for all the latest episodes! →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
Chris has been a leader in IT and security for over 20 years. He has written multiple books on networking and security including "Mastering Cisco Routers" and "Mastering Network Security". Full Show Notes: https://wiki.securityweekly.com/ES_Episode95 Visit http://securityweekly.com/esw for all the latest episodes!
This week, Paul and John welcome Chris Brenton, Chief Operating Officer of Active Countermeasures! In the Enterprise News, we have updates from Riverbed, Tufin, ServiceNow, Splunk, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode95 Visit https://www.securityweekly.com/esw for all the latest episodes! →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly