Podcast appearances and mentions of bill brenner

  • 16PODCASTS
  • 54EPISODES
  • 39mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 13, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about bill brenner

Latest podcast episodes about bill brenner

Paul's Security Weekly
Trustworthy AI, ISW Interviews - Pamela Gupta - ESW #335

Paul's Security Weekly

Play Episode Listen Later Oct 13, 2023 117:58


The world of AI is exploding, as excitement about generative AI creates a gold rush. We've already seen a huge number of new GenAI-based startups, products, and features flooding the market and we'll see a lot more emerge over the next few years. Generative AI will transform how we do business and how we interact with businesses, so right now is an excellent time to consider how to adopt AI safely. Pamela Gupta's company literally has "trust" and "AI" in the name (Trusted.ai), so we couldn't think of anyone better to come on and have this conversation with. Interview Resources: https://trusted.ai https://nvlpubs.nist.gov/nistpubs/ai/nist.ai.100-1.pdf There's a lot of talk about AI, especially with the rise of apps like ChatGPT. Despite there being a huge amount of hype, there are legitimately practical applications for leveraging AI concepts in meaningful ways to improve the efficiency and effectiveness of your cybersecurity program. We'll discuss a few examples and show you some ways to bring AI out of the hype and into a proper tool to empower your security and risk program. This segment is sponsored by Tenable. Visit https://www.securityweekly.com/tenableisw to learn more about them! Threat actors don't think in silos and neither should cybersecurity solutions. In this fireside chat with Uptycs' newly appointed CRO, Mike Campfield, learn why organizations need to adopt a consolidation approach to win in cyber security, why it's important to “shift up,” and what Mike is most excited about in his new role. This segment is sponsored by Uptycs. Visit https://www.securityweekly.com/uptycsisw to learn more about them! Deidre Diamond, founder & CEO of CyberSN, talks about her efforts to address InfoSec burnout and the skills shortage impacting the industry. As long as there are profits to be made, cybercriminals will continue to monetize enterprise assets—whether they be devices, applications, data, or users. It only takes one weak or unknown asset to compromise an entire organization. Brian will discuss why enterprises need to move away from assumption-based approaches to asset data and decision making to evidence-based asset intelligence to secure their environments quickly, easily, and at scale. This segment is sponsored by Sevco Security. Visit https://www.securityweekly.com/sevcoisw to learn more about them! In this ISW interview, CRA's Bill Brenner catches up with Kevin Johnson of Secure Ideas for a chat about application security. In this segment from ISW, Dakota State COO and General Counsel Stacy Kooistra talks to Bill Brenner about the university's effort create more cyber warriors. Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/esw for all the latest episodes!  

Enterprise Security Weekly (Audio)
Trustworthy AI, ISW Interviews - Pamela Gupta - ESW #335

Enterprise Security Weekly (Audio)

Play Episode Listen Later Oct 13, 2023 117:58


The world of AI is exploding, as excitement about generative AI creates a gold rush. We've already seen a huge number of new GenAI-based startups, products, and features flooding the market and we'll see a lot more emerge over the next few years. Generative AI will transform how we do business and how we interact with businesses, so right now is an excellent time to consider how to adopt AI safely. Pamela Gupta's company literally has "trust" and "AI" in the name (Trusted.ai), so we couldn't think of anyone better to come on and have this conversation with. Interview Resources: https://trusted.ai https://nvlpubs.nist.gov/nistpubs/ai/nist.ai.100-1.pdf There's a lot of talk about AI, especially with the rise of apps like ChatGPT. Despite there being a huge amount of hype, there are legitimately practical applications for leveraging AI concepts in meaningful ways to improve the efficiency and effectiveness of your cybersecurity program. We'll discuss a few examples and show you some ways to bring AI out of the hype and into a proper tool to empower your security and risk program. This segment is sponsored by Tenable. Visit https://www.securityweekly.com/tenableisw to learn more about them! Threat actors don't think in silos and neither should cybersecurity solutions. In this fireside chat with Uptycs' newly appointed CRO, Mike Campfield, learn why organizations need to adopt a consolidation approach to win in cyber security, why it's important to “shift up,” and what Mike is most excited about in his new role. This segment is sponsored by Uptycs. Visit https://www.securityweekly.com/uptycsisw to learn more about them! Deidre Diamond, founder & CEO of CyberSN, talks about her efforts to address InfoSec burnout and the skills shortage impacting the industry. As long as there are profits to be made, cybercriminals will continue to monetize enterprise assets—whether they be devices, applications, data, or users. It only takes one weak or unknown asset to compromise an entire organization. Brian will discuss why enterprises need to move away from assumption-based approaches to asset data and decision making to evidence-based asset intelligence to secure their environments quickly, easily, and at scale. This segment is sponsored by Sevco Security. Visit https://www.securityweekly.com/sevcoisw to learn more about them! In this ISW interview, CRA's Bill Brenner catches up with Kevin Johnson of Secure Ideas for a chat about application security. In this segment from ISW, Dakota State COO and General Counsel Stacy Kooistra talks to Bill Brenner about the university's effort create more cyber warriors. Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/esw for all the latest episodes!  

Paul's Security Weekly TV
Weaponizing Asset Intelligence, App Sec at ISW - Kevin Johnson, Brian Contos, Stacy Kooistra - ESW #335

Paul's Security Weekly TV

Play Episode Listen Later Oct 13, 2023 33:52


As long as there are profits to be made, cybercriminals will continue to monetize enterprise assets—whether they be devices, applications, data, or users. It only takes one weak or unknown asset to compromise an entire organization. Brian will discuss why enterprises need to move away from assumption-based approaches to asset data and decision making to evidence-based asset intelligence to secure their environments quickly, easily, and at scale. This segment is sponsored by Sevco Security. Visit https://www.securityweekly.com/sevcoisw to learn more about them! In this ISW interview, CRA's Bill Brenner catches up with Kevin Johnson of Secure Ideas for a chat about application security. In this segment from ISW, Dakota State COO and General Counsel Stacy Kooistra talks to Bill Brenner about the university's effort create more cyber warriors. Show Notes: https://securityweekly.com/esw-335

Enterprise Security Weekly (Video)
Weaponizing Asset Intelligence, App Sec at ISW - Kevin Johnson, Brian Contos, Stacy Kooistra - ESW #335

Enterprise Security Weekly (Video)

Play Episode Listen Later Oct 13, 2023 33:52


As long as there are profits to be made, cybercriminals will continue to monetize enterprise assets—whether they be devices, applications, data, or users. It only takes one weak or unknown asset to compromise an entire organization. Brian will discuss why enterprises need to move away from assumption-based approaches to asset data and decision making to evidence-based asset intelligence to secure their environments quickly, easily, and at scale. This segment is sponsored by Sevco Security. Visit https://www.securityweekly.com/sevcoisw to learn more about them! In this ISW interview, CRA's Bill Brenner catches up with Kevin Johnson of Secure Ideas for a chat about application security. In this segment from ISW, Dakota State COO and General Counsel Stacy Kooistra talks to Bill Brenner about the university's effort create more cyber warriors. Show Notes: https://securityweekly.com/esw-335

Paul's Security Weekly
Tackling the Perennial Problem of Device Management, News, BlackHat Interviews - Jason Meller - ESW #329

Paul's Security Weekly

Play Episode Listen Later Aug 25, 2023 152:02


Incredibly, the seemingly simple task of managing corporate-owned devices is still a struggle for most organizations in 2023. Maybe best MDM for Mac doesn't work with Windows, or the best MDM for Windows doesn't work with Mac. Maybe neither have Linux support. Perhaps they don't provide enough insight into the endpoint, or control over it. Whatever the case, security leaders never seem satisfied with their MDM solution and are always investigating new ones. Now, Kolide has stepped in with a unique approach to device management, combining the flexibility and industry support for OSQuery and built to integrate with IdP giant Okta. We discuss Kolide's entrance into the device management space and the current state of MDM - what's wrong with it, and how does Kolide propose to fix it? This segment is sponsored by Kolide. Visit https://securityweekly.com/kolide to learn more about them! Segment description coming soon! Record funding levels over the last two weeks top 2023 and the same time last year. We discuss Palo Alto's plans for the future, CISA's analysis of the LAPSUS$ hacking group, and the uselessness of Quantum Security pitches. Chrome adds the ability to alert users about malicious extensions. A great post from Thinkst has us talking about why vendors (and buyers) need to be careful about default behaviors and documentation. You won't want to miss the excellent squirrel story - a front end for Reddit that looks like Microsoft Outlook. During this segment, Jon will explore today's ransomware economy players from IABS to RaaS affiliates, to money launders and now C2Ps. For the discussion, Jon will leverage Halcyon's latest research, which demonstrates a new technique to uncover how C2Ps, like Cloudzy, are used to identify upcoming ransomware campaigns and other advanced attacks. The research revealed that Cloudzy, knowingly or not, provided services to attackers while assuming a legitimate business profile. Threat actors that leveraged Cloudzy include APT groups tied to the Chinese, Iranian, North Korean, Russian, Indian, Pakistani, and Vietnamese governments; a sanctioned Israeli spyware vendor whose tools are known to target civilians; several criminal syndicates and ransomware affiliates whose campaigns have spurred international headlines. This segment is sponsored by Halcyon. Visit https://securityweekly.com/halcyonbh to learn more about them! In this session, Snehal will discuss several real-world examples of what autonomous pentesting discovered in networks just like yours. You'll hear more about how fast and easy it was to safely compromise some of the biggest (and smallest) networks in the world - with full domain takeover in a little more than a few hours. Learn how you can safely do the same in your own network today!  This segment is sponsored by Horizon3.ai. Visit https://securityweekly.com/horizon3aibh to learn more about them! In this Black Hat 2023 interview, CRA's Bill Brenner and Sophos' John Shier discuss the company's latest research on the Royal ransomware gang. Though Royal is a notoriously closed off group that doesn't openly solicit affiliates from underground forums, granular similarities in the forensics of the attacks suggest all three groups are sharing either affiliates or highly specific technical details of their activities.  This segment is sponsored by Sophos.  Visit https://securityweekly.com/sophosbh to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw-329

Enterprise Security Weekly (Audio)
Tackling the Perennial Problem of Device Management, News, BlackHat Interviews - Jason Meller - ESW #329

Enterprise Security Weekly (Audio)

Play Episode Listen Later Aug 25, 2023 152:02


Incredibly, the seemingly simple task of managing corporate-owned devices is still a struggle for most organizations in 2023. Maybe best MDM for Mac doesn't work with Windows, or the best MDM for Windows doesn't work with Mac. Maybe neither have Linux support. Perhaps they don't provide enough insight into the endpoint, or control over it. Whatever the case, security leaders never seem satisfied with their MDM solution and are always investigating new ones. Now, Kolide has stepped in with a unique approach to device management, combining the flexibility and industry support for OSQuery and built to integrate with IdP giant Okta. We discuss Kolide's entrance into the device management space and the current state of MDM - what's wrong with it, and how does Kolide propose to fix it? This segment is sponsored by Kolide. Visit https://securityweekly.com/kolide to learn more about them! Segment description coming soon! Record funding levels over the last two weeks top 2023 and the same time last year. We discuss Palo Alto's plans for the future, CISA's analysis of the LAPSUS$ hacking group, and the uselessness of Quantum Security pitches. Chrome adds the ability to alert users about malicious extensions. A great post from Thinkst has us talking about why vendors (and buyers) need to be careful about default behaviors and documentation. You won't want to miss the excellent squirrel story - a front end for Reddit that looks like Microsoft Outlook. During this segment, Jon will explore today's ransomware economy players from IABS to RaaS affiliates, to money launders and now C2Ps. For the discussion, Jon will leverage Halcyon's latest research, which demonstrates a new technique to uncover how C2Ps, like Cloudzy, are used to identify upcoming ransomware campaigns and other advanced attacks. The research revealed that Cloudzy, knowingly or not, provided services to attackers while assuming a legitimate business profile. Threat actors that leveraged Cloudzy include APT groups tied to the Chinese, Iranian, North Korean, Russian, Indian, Pakistani, and Vietnamese governments; a sanctioned Israeli spyware vendor whose tools are known to target civilians; several criminal syndicates and ransomware affiliates whose campaigns have spurred international headlines. This segment is sponsored by Halcyon. Visit https://securityweekly.com/halcyonbh to learn more about them! In this session, Snehal will discuss several real-world examples of what autonomous pentesting discovered in networks just like yours. You'll hear more about how fast and easy it was to safely compromise some of the biggest (and smallest) networks in the world - with full domain takeover in a little more than a few hours. Learn how you can safely do the same in your own network today!  This segment is sponsored by Horizon3.ai. Visit https://securityweekly.com/horizon3aibh to learn more about them! In this Black Hat 2023 interview, CRA's Bill Brenner and Sophos' John Shier discuss the company's latest research on the Royal ransomware gang. Though Royal is a notoriously closed off group that doesn't openly solicit affiliates from underground forums, granular similarities in the forensics of the attacks suggest all three groups are sharing either affiliates or highly specific technical details of their activities.  This segment is sponsored by Sophos.  Visit https://securityweekly.com/sophosbh to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw-329

Paul's Security Weekly TV
Ransomware Economy Players, Pentest War Stories, & Ransomware Groups Working Together - ESW #329

Paul's Security Weekly TV

Play Episode Listen Later Aug 25, 2023 45:17


During this segment, Jon will explore today's ransomware economy players from IABS to RaaS affiliates, to money launders and now C2Ps. For the discussion, Jon will leverage Halcyon's latest research, which demonstrates a new technique to uncover how C2Ps, like Cloudzy, are used to identify upcoming ransomware campaigns and other advanced attacks. The research revealed that Cloudzy, knowingly or not, provided services to attackers while assuming a legitimate business profile. Threat actors that leveraged Cloudzy include APT groups tied to the Chinese, Iranian, North Korean, Russian, Indian, Pakistani, and Vietnamese governments; a sanctioned Israeli spyware vendor whose tools are known to target civilians; several criminal syndicates and ransomware affiliates whose campaigns have spurred international headlines. This segment is sponsored by Halcyon. Visit https://securityweekly.com/halcyonbh to learn more about them!   In this session, Snehal will discuss several real-world examples of what autonomous pentesting discovered in networks just like yours. You'll hear more about how fast and easy it was to safely compromise some of the biggest (and smallest) networks in the world - with full domain takeover in a little more than a few hours. Learn how you can safely do the same in your own network today! This segment is sponsored by Horizon3.ai. Visit https://securityweekly.com/horizon3aibh to learn more about them!   In this Black Hat 2023 interview, CRA's Bill Brenner and Sophos' John Shier discuss the company's latest research on the Royal ransomware gang. Though Royal is a notoriously closed off group that doesn't openly solicit affiliates from underground forums, granular similarities in the forensics of the attacks suggest all three groups are sharing either affiliates or highly specific technical details of their activities. This segment is sponsored by Sophos. Visit https://securityweekly.com/sophosbh to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-329 

Enterprise Security Weekly (Video)
Ransomware Economy Players, Pentest War Stories, & Ransomware Groups Working Together - ESW #329

Enterprise Security Weekly (Video)

Play Episode Listen Later Aug 25, 2023 45:17


During this segment, Jon will explore today's ransomware economy players from IABS to RaaS affiliates, to money launders and now C2Ps. For the discussion, Jon will leverage Halcyon's latest research, which demonstrates a new technique to uncover how C2Ps, like Cloudzy, are used to identify upcoming ransomware campaigns and other advanced attacks. The research revealed that Cloudzy, knowingly or not, provided services to attackers while assuming a legitimate business profile. Threat actors that leveraged Cloudzy include APT groups tied to the Chinese, Iranian, North Korean, Russian, Indian, Pakistani, and Vietnamese governments; a sanctioned Israeli spyware vendor whose tools are known to target civilians; several criminal syndicates and ransomware affiliates whose campaigns have spurred international headlines. This segment is sponsored by Halcyon. Visit https://securityweekly.com/halcyonbh to learn more about them!   In this session, Snehal will discuss several real-world examples of what autonomous pentesting discovered in networks just like yours. You'll hear more about how fast and easy it was to safely compromise some of the biggest (and smallest) networks in the world - with full domain takeover in a little more than a few hours. Learn how you can safely do the same in your own network today! This segment is sponsored by Horizon3.ai. Visit https://securityweekly.com/horizon3aibh to learn more about them!   In this Black Hat 2023 interview, CRA's Bill Brenner and Sophos' John Shier discuss the company's latest research on the Royal ransomware gang. Though Royal is a notoriously closed off group that doesn't openly solicit affiliates from underground forums, granular similarities in the forensics of the attacks suggest all three groups are sharing either affiliates or highly specific technical details of their activities. This segment is sponsored by Sophos. Visit https://securityweekly.com/sophosbh to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-329 

Paul's Security Weekly
ESW #319 - Amitai Ratzon, Steve Ragan, Deepika Chauhan, Thomas Kinsella, Jon Check

Paul's Security Weekly

Play Episode Listen Later May 26, 2023 145:11


On this edition of the ESW news, we're all over the place! Funding and acquisitions are a little sad right now, but AI and TikTok bans raise our spirits. The hosts are split on feelings about the new .zip gTLD, there's a new standard for scoring an "AI Influence Level" (AIL), and lessons learned from Joe Sullivan's case and other Uber breaches. Also, don't miss the new AI tool DragGAN, which enables near magical levels of ease when manipulating photos.   What's even real anymore? We might not be able to tell for long... The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in the private and public sectors, Jon Check, executive director of Cyber Protection Solutions at Raytheon Intelligence & Space, will share the critical steps organizations must take to best prepare for a security breach. This segment is sponsored by Raytheon. Visit https://securityweekly.com/raytheonrsac to learn more about them!   While companies utilize dozens of security solutions, they continue to be compromised and are continually searching for their real cybersecurity gaps amongst the overload of vulnerability data. A primary issue security teams face is that they lack a way to continuously validate the effectiveness of the different security solutions they have in place. Automated Security Validation is revolutionizing cybersecurity by applying software validation algorithms, for what was once manual penetration testing jobs. It takes the attacker's perspective to challenge the integrity and resilience of security defenses by continuously emulating cyber attacks against them. This segment is sponsored by Pentera. Visit https://securityweekly.com/penterarsac to learn more about them!   Security teams are always on the lookout for external threats that can harm our organizations. However, an internal threat can derail productivity and lead to human error and burnout: repetitive, mundane tasks. To effectively defend against evolving threats, organizations must leverage no-code automation and free analysts to focus on higher-level projects that can improve their organization's security posture. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesrsac to learn more about them!   In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!   Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw319 

Enterprise Security Weekly (Audio)
ESW #319 - Amitai Ratzon, Steve Ragan, Deepika Chauhan, Thomas Kinsella, Jon Check

Enterprise Security Weekly (Audio)

Play Episode Listen Later May 26, 2023 145:11


On this edition of the ESW news, we're all over the place! Funding and acquisitions are a little sad right now, but AI and TikTok bans raise our spirits. The hosts are split on feelings about the new .zip gTLD, there's a new standard for scoring an "AI Influence Level" (AIL), and lessons learned from Joe Sullivan's case and other Uber breaches. Also, don't miss the new AI tool DragGAN, which enables near magical levels of ease when manipulating photos.   What's even real anymore? We might not be able to tell for long... The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in the private and public sectors, Jon Check, executive director of Cyber Protection Solutions at Raytheon Intelligence & Space, will share the critical steps organizations must take to best prepare for a security breach. This segment is sponsored by Raytheon. Visit https://securityweekly.com/raytheonrsac to learn more about them!   While companies utilize dozens of security solutions, they continue to be compromised and are continually searching for their real cybersecurity gaps amongst the overload of vulnerability data. A primary issue security teams face is that they lack a way to continuously validate the effectiveness of the different security solutions they have in place. Automated Security Validation is revolutionizing cybersecurity by applying software validation algorithms, for what was once manual penetration testing jobs. It takes the attacker's perspective to challenge the integrity and resilience of security defenses by continuously emulating cyber attacks against them. This segment is sponsored by Pentera. Visit https://securityweekly.com/penterarsac to learn more about them!   Security teams are always on the lookout for external threats that can harm our organizations. However, an internal threat can derail productivity and lead to human error and burnout: repetitive, mundane tasks. To effectively defend against evolving threats, organizations must leverage no-code automation and free analysts to focus on higher-level projects that can improve their organization's security posture. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesrsac to learn more about them!   In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!   Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw319 

Paul's Security Weekly TV
Digital Trust as a Strategic Imperative & Insights from RSA Conference 2023 - Deepika Chauhan, Steve Ragan - ESW #319

Paul's Security Weekly TV

Play Episode Listen Later May 26, 2023 25:47


In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!   Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw319 

Enterprise Security Weekly (Video)
Digital Trust as a Strategic Imperative & Insights from RSA Conference 2023 - Deepika Chauhan, Steve Ragan - ESW #319

Enterprise Security Weekly (Video)

Play Episode Listen Later May 26, 2023 25:47


In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!   Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw319 

Paul's Security Weekly TV
Wemo Vulnerability, EXSI Threats, Critical Cisco Flaws, IAM, Malware, and More - SWN #299

Paul's Security Weekly TV

Play Episode Listen Later May 19, 2023 26:51


$10M reward, a serious wemo vulnerability, EXSI threats, critical Cisco flaws, millions of smart phones with preinstalled malware and Bill Brenner   Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn299 

Hack Naked News (Video)
Wemo Vulnerability, EXSI Threats, Critical Cisco Flaws, IAM, Malware, and More - SWN #299

Hack Naked News (Video)

Play Episode Listen Later May 19, 2023 26:51


$10M reward, a serious wemo vulnerability, EXSI threats, critical Cisco flaws, millions of smart phones with preinstalled malware and Bill Brenner   Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn299 

Infoblox ThreatTalk
Meet the Author: Bill Brenner on the 2023 Global State of Cybersecurity Study

Infoblox ThreatTalk

Play Episode Listen Later May 17, 2023 30:09


While business line execs can get distracted by the latest media cyberthreat hype, effective security professionals stay on top of data-based security research and studies to constantly evolve their security programs. Tune into our latest podcast where we have invited Bill Brenner from the CyberRisk Alliance to discuss their 2023 Global State of Cybersecurity Study. Used to produce over a dozen global, regional, and country-level reports, we will discuss highlights from the study, as well as some insights from Bill that go beyond the report.View the full report here: https://info.infoblox.com/resources-whitepapers-2023-global-state-of-cybersecurity-studyTune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.

The Stogie Geeks Cigar Podcast
SG #373 - Jason's Blind Tasting Challenge

The Stogie Geeks Cigar Podcast

Play Episode Listen Later Jan 5, 2023 117:44


This week, Bill Brenner joins the stogie geeks as they take on Jason ABQ's WICKED blind cigar tasting challenge! Follow us on Twitter: @stogiegeeks Facebook:  https://www.facebook.com/stogiegeeks Instagram:  https://instagram.com/stogiegeeks Follow us on Twitter: @stogiegeeks Facebook:  https://www.facebook.com/stogiegeeks Instagram:  https://instagram.com/stogiegeeks Show Notes: https://stogiegeeks.com/sg373

The Stogie Geeks Cigar Show
Jason's Blind Tasting Challenge - SG #373

The Stogie Geeks Cigar Show

Play Episode Listen Later Oct 6, 2022 117:50


This week, Bill Brenner joins the stogie geeks as they take on Jason ABQ's WICKED blind cigar tasting challenge! Follow us on Twitter: @stogiegeeks Facebook:  https://www.facebook.com/stogiegeeks Instagram:  https://instagram.com/stogiegeeks Show Notes: https://stogiegeeks.com/sg373

Infoblox ThreatTalk
An Author Interview: 2022 Global State of Security Report

Infoblox ThreatTalk

Play Episode Listen Later Jun 8, 2022 31:28


ThreatTalk guest Bill Brenner of the CyberRisk Alliance (CRA) joins us to discuss a recent global security survey they conducted on behalf of Infoblox. We'll go over and beyond survey results to better understand how they plan to address current security concerns, investment issues, preferred methodologies, and more. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.

Look Left @ Marketing
What to Expect at RSA 2022 with CyberRisk Alliance

Look Left @ Marketing

Play Episode Listen Later May 26, 2022 32:33


The 2022 RSA Conference returns June 6-9 in San Francisco and online. Two people who know a thing or two about the evolution of security are Jill Aitoro, SVP of content strategy for CyberRisk Alliance and editor in chief for SC Media, and Bill Brenner, VP of custom content at CyberRisk Alliance. Jill and Bill joined Look Left's Davida Dinerman to preview the upcoming show and to dig into what they're looking forward to:01:17 - The excitement of returning to live events03:25 - What Jill and Bill are most looking forward to at RSA04:45 - The impact Zoom has had on SME interviews7:06 - What topics they're looking to cover at RSA11:27 - Changes they've seen at RSA over the years15:11 - RSA as an opportunity to produce a lot of interesting content18:38 - What they look for in a good interview21:49 - What challenges there are to pitching media24:50 - Favorite “hot spots” at RSA28:06 - Interesting stories from past RSAs29:58 - How security blogging has evolved 

Fountain of Youth
Episode 9: U.S. Masters Swimming Sr Director Bill Brenner

Fountain of Youth

Play Episode Listen Later Mar 16, 2022 32:04


Studies show over 54% of adults can't swim well enough to save their own life and 39% of adults couldn't swim a single lap.  Yet swimming is an exercise that is as close to a fountain of youth as you can get. It's low impact, reduces blood pressure, increases muscle mass and bone density and flexibility, improves oxygen and blood flow to the brain. It's great for your overall cardiovascular health and mental health. And it's Bill Brenner's mission to teach everyone to swim.  This week on FOY, Marc talks with the U.S. Masters Swimming Senior Director of Club and Coach Development about why that's important and how USMS is expanding opportunities to be more inclusive of everyone, no matter what their skill level is, no matter what their gender is, no matter what their motivation is. Learn more about U.S. Masters Swimming at https://www.usms.org/ Follow USMS on Facebook or IG, Twitter & YouTube For more information on Growing Bolder & the NSGA, visit growingbolder.com/nsga Follow Growing Bolder Follow National Senior Games Association #mastersathletics #mastersswimming

Swim Out of the Box
#15 - Like Food? We Do

Swim Out of the Box

Play Episode Listen Later Oct 9, 2019


Not gonna lie, there isn’t too much swim talk going on in this one. Dominic is GONE for this episode, so I decided to chat with our good friend Bill Brenner, COO of US Masters Swimming, about my all time favorite topic: FOOD! We talk about what we like to eat before and after swim workouts and basically just food in general. Ugh, I’m getting hungry just thinking about it.

food coo bill brenner
Swim Out of the Box
#10 - Teaching & Learning The Skill/Sport of Swimming

Swim Out of the Box

Play Episode Listen Later Aug 31, 2019


A big welcome to one of our closest friends in the swimming world, COO of US Masters Swimming (USMS), Bill Brenner! Listen in as Dominic talks with Bill about the process of teaching and learning the sport/skill of swimming. Bill is the creator of USMS’s certification classes, and he and Dominic travel around the US teaching people how to be swim coaches and how to be USMS Certified learn-to-swim instructors.

Sophos Podcasts
RSA 2017 - Day 3 - Roving report

Sophos Podcasts

Play Episode Listen Later Feb 16, 2017 9:07


Join Paul Ducklin and Bill Brenner for our third and final roving report from RSA Conference 2017.

Sophos Podcasts
RSA 2017 - Day 2 - Roving report

Sophos Podcasts

Play Episode Listen Later Feb 15, 2017 8:33


Bill Brenner of Sophos is at the RSA Conference 2017 in San Franscisco. He talks to Paul Ducklin about the lessons learned so far...

Sophos Podcasts
RSA 2017 - Day 1 - Roving report

Sophos Podcasts

Play Episode Listen Later Feb 14, 2017 6:51


Bill Brenner from Sophos is our "roving reporter" at the RSA 2017 conference in San Francisco. Paul Ducklin gets Bill's take on the hot topics from the first day of the event.

san francisco rsa roving sophos bill brenner paul ducklin
Bill Murphy's  RedZone Podcast | World Class IT Security
What is Your Plan for: Super-Vulnerabilities, Brand Take-down, & Incident Response? | Episode #30

Bill Murphy's RedZone Podcast | World Class IT Security

Play Episode Listen Later Oct 27, 2015 44:20


In this podcast episode I interview Bill Brenner, who is an expert at digesting threat intelligence information and making this information available to a wide pool of people from C-Suite Executives to coders and developers. Bill is a Senior Technical writer for Akamai and has been a writer for CSO Online, and Liquid Matrix Security Digest. Additionally, he created and writes in a blog called the OCD Diaries where he discusses mental health issues with IT Executives and staff within the technology industry. Top 3 items for an IT Security Decision Maker to be concerned about moving forward: Super-vulnerabilities like Heartbleed, Shellshock, Poodle and OpenSSL - Identify the risks these pose your assets within your company and remediate them. Incident Response – Remember to develop a BCP/DR plan for IT Security Incidents Protect Your Brand – Which hacking groups don’t like your company or brand that leave you vulnerable to DDoS, cyber espionage, and ransomware style of attacks? You will also learn some of the best sources for IT Security threat information: Securosis Mike Rothman - Securosis Rich Mogull - Securosis Adrian Lane - Securosis Blogs and Podcasts: Jack Daniel - Tenable Security Bsides movement NAISG – National Information Security Group CSO Online State of the Internet Security podcasts Security Kahuna podcasts Vulnerability Information Sources: Threat Post CSO Online Security Ledger – Paul Roberts CSI Group SANS Institute - Internet Storm Center Humanity in Security - Mental Health The importance of good mental health in the IT Security profession as it relates to depression, anxiety, coping with stress, OCD, Asperger’s, Autism. The OCD Diaries – An opportunity to destigmatize mental illness and to give people in our industry a life raft and share tools that can help them. Taking your mental disorders and turning them into super powers! Additional Show Notes Communicating what threat intelligence researchers are seeing directly to a more complex audience and hitting it at all levels - geared towards the larger security industry or community What does alignment between product managers and the threat intelligence team mean? The data [Akamai] receives is coming from the deployment of their products in the field. “Taking what we are seeing from our technology deployments and sizing it up against what other companies see and you know at the end of it giving people a bigger picture so that they can take actions that they need to take. Sharing of research is crucial – the benefits of information sharing between companies and how it helps keep out the bad guys. You can't take the information that you receive internally and makes proper sense of it without comparing it with what's going on elsewhere. How can we get to the point where it’s actually actionable sharing? What does it mean to have a third-party attack? A common platform like WordPress can have third-party widgets and plugins that they didn’t create and essentially those can be malware or exploit kits of some sort so we need to be aware that they can be leveraged. Be aware of where the vulnerabilities are. The next step with SSL and moving towards TLS – pros and cons. How to reach Bill Brenner:LinkedInFacebookTwitterAkamai BlogThe OCD Diaries Former Publications:Liquid Matrix Security DigestCSO Online What is Your Plan for: Super-Vulnerabilities| Brand Take-down| & Incident Response| Humanity in Security - RedZone All methods of how to access the show are below: Listen on iTunes (for iPhones etc.) Listen to it on Stitcher (This is for Android Phone Users. Download the Stitcher app here) Stream it on Libsyn Listen to it on Soundcloud (This is for listening via PC/Mac Browser) Please subscribe here to Bill Murphy’s Redzone Podcast on iTunes Subscribe to my RSS Feed here Link to LinkedIn blog post This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives. Sign up for a demo here. Leave a podcast review here How do I leave a review? Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. Follow Bill on LinkedIn and Twitter. Subscribe here for weekly podcast, CIO Mastermind and CISO Mastermind updates delivered to your inbox easily and effortlessly.    

Akamai - Security Podcast
Security Kahuna Podcast, 3-3-15

Akamai - Security Podcast

Play Episode Listen Later Mar 4, 2015 20:41


Bill Brenner, Dave Lewis and Martin McKeay discuss the latest security breaches and other issues.

security kahuna web security dave lewis bill brenner martin mckeay
Liquidmatrix Security Digest Podcast
Liquidmatrix Security Digest Podcast - Episode 50

Liquidmatrix Security Digest Podcast

Play Episode Listen Later Jan 16, 2015 57:56


Episode 0x50 Revenge of the Fourth We've been around, just not... you know... around. It's best that you do not think about what happened to episodes that were not published. Upcoming this week... Lots of News Breaches SCADA / Cyber, cyber... etc. finishing it off with DERPs/Mailbag (or Deep Dive) And there are weekly Briefs - no arguing or discussion allowed And if you've got commentary, please sent it to mailbag@liquidmatrix.org for us to check out. DISCLAIMER: It's not that explicit, but you may want to use headphones if you're at work. ADDITIONAL DISCLAIMER: In case it is unclear, this is the story of 5 opinionated infosec pros who have sufficient opinions of their own they don't need to speak for anyone except themselves. Ok? Good. In this episode: News and Commentary Home routers take down Sony, Microsoft, Kerbs... you're next Google won't fix old vulns (but it's not their fault) JJX talks about Year 1 -- And it's my first year too! 3 Problems With UK PM Cameron's Crypto Proposal SCADA / Cyber, cyber... etc There's vulns in the hermit kingdom's glorious OS And a crazy web browser South Korea smokes a doobie and says North Korea has computers DERP Don't enjoy respawning cookies? Don't use our service Adsense didn't watch Matt Jay's talk on malvertising Marriott Agrees to Stop Blocking Guest WiFi Devices Mailbag Hi guysWhere the fuck have you been sincerely the internet of thingersWe told you already! Briefly -- NO ARGUING OR DISCUSSION ALLOWED Keystroke Sniffer inside a USB Wallwart What Happens When You Install the Top 10 Download Dot Com Apps I'm hiring! I'm hiring! Liquidmatrix Staff Projects -- gratuitous self-promotion We'll get back to you when we have projects again. In the mean time, find us here: Dave: - #jeSuisCharlie James: -  Ben: - Bed Wil: - Anywhere that is nowhere. Other LSD Writers: - Anyone else notice that Bill Brenner posts to LSD ALL THE TIME? Wrapping up... NyQuil - you giant fucking Q Closing Thoughts Seacrest Says: Who the fuck is Seacrest. Creative Commons license: BY-NC-SA

Akamai - Security Podcast
Security Kahuna Podcast, 1-13-15

Akamai - Security Podcast

Play Episode Listen Later Jan 13, 2015 24:16


Microsoft's announcement that it will no longer offer advance patch notification to the masses has rekindled the debate over how best to handle vulnerability disclosure. Bill Brenner, Dave Lewis and Martin McKeay discuss this and other issues.

Akamai - Security Podcast
Security Kahuna Podcast, 12-8-14

Akamai - Security Podcast

Play Episode Listen Later Dec 10, 2014 27:04


Bill Brenner, Dave Lewis and Martin McKeay discuss the security breach at Sony, lawsuits between the banks and Target, and much more.

Akamai - Security Podcast
Security Kahuna Podcast, 10-14

Akamai - Security Podcast

Play Episode Listen Later Oct 29, 2014 29:04


Bill Brenner, Dave Lewis and Martin McKeay ponder the explosion of critical vulnerabilities like Poodle, Shellshock and Heartbleed.

Akamai - Security Podcast
Third-Party Attacks

Akamai - Security Podcast

Play Episode Listen Later Oct 22, 2014 9:04


Bill Brenner talks to Akamai CSIRT researcher Mike Kun about the rise of third-party attacks.

Akamai - Security Podcast
Shellshock Bash Explained

Akamai - Security Podcast

Play Episode Listen Later Sep 26, 2014 19:15


Akamai's Martin McKeay, Michael Smith and Bill Brenner discuss the Shellshock Bash bug and what Akamai is doing to keep customers secure.

Akamai - Security Podcast
Inside the PLXsert

Akamai - Security Podcast

Play Episode Listen Later Sep 16, 2014 10:11


Bill Brenner and Akamai PLXsert Manager David Fernandez discuss the latest attack research from his team.

Akamai - Security Podcast
Security Kahuna Podcast, Episode 3

Akamai - Security Podcast

Play Episode Listen Later Sep 10, 2014 30:25


Akamai's Bill Brenner, Dave Lewis and Martin McKeay discuss the pros and cons of Google Glass Detector, software designed to detect Google Glass and boot it from any local Wi-Fi network. They also discuss the iCloud/4Chan controversy and look ahead to upcoming security conferences.

Akamai - Security Podcast
Meet the InfoSec Interns

Akamai - Security Podcast

Play Episode Listen Later Aug 13, 2014 7:54


Bill Brenner interviews three interns who spent the summer working with the InfoSec team. A look at their projects and where they hope to go from here.

Akamai - Security Podcast
Security Kahuna Podcast, Episode 2

Akamai - Security Podcast

Play Episode Listen Later Aug 11, 2014 29:24


Bill Brenner, Martin McKeay, Dave Lewis and some special guests report from Las Vegas during Black Hat, BSidesLV and DEF CON 2014.

Akamai - Security Podcast
Akamai's Israeli Research Division

Akamai - Security Podcast

Play Episode Listen Later Jul 22, 2014 10:33


Bill Brenner talks to Adi Ludmer, one of our researchers in Tel Aviv, about the nature of his team's work.

Akamai - Security Podcast
Security Kahuna Podcast, Episode 1

Akamai - Security Podcast

Play Episode Listen Later Jul 15, 2014 23:52


In the first episode of the Security Kahuna Podcast, Bill Brenner, Dave Lewis and Martin McKeay discuss the big security issues of the day.

Akamai - Security Podcast
Online Extortion and World Cup Risks

Akamai - Security Podcast

Play Episode Listen Later May 28, 2014 8:55


Bill Brenner talks to CSIRT researcher Mike Kun about the latest threats his team is monitoring, including online extortion attempts and possible disruptions during the World Cup.

Akamai - Security Podcast
CSO Andy Ellis on Heartbleed

Akamai - Security Podcast

Play Episode Listen Later May 12, 2014 9:23


Akamai's CSO and Bill Brenner discuss the company's response to Heartbleed, including lessons learned and next steps.

Akamai - Security Podcast
Cyber Competition in Review

Akamai - Security Podcast

Play Episode Listen Later Apr 1, 2014 13:22


Bill Brenner and Kathryn Kun review the recent Northeast Collegiate Cyber Defense Competition (NECCDC).

Akamai - Security Podcast
Humanity in Security

Akamai - Security Podcast

Play Episode Listen Later Mar 26, 2014 11:07


Bill Brenner and Christian Ternus discuss Humanity in Security, an Akamai effort to address burnout, depression and stress in the security community.

Akamai - Security Podcast
RSAC 2014 in Review

Akamai - Security Podcast

Play Episode Listen Later Mar 13, 2014 4:21


Bill Brenner, Stuart Scholly, SVP and General Manager of Akamai's Security Business Unit, Akamai CSO Andy Ellis, and Program Manager Meg Grady-Troia recap RSA Conference 2014.

Akamai - Security Podcast
Brian Bourne and SecTOR

Akamai - Security Podcast

Play Episode Listen Later Feb 12, 2014 8:14


Bill Brenner finishes off a series on volunteers in the security community - particularly those who organize and volunteer at security conferences around the world. His guest is Brian Bourne, co-founder of the Security Education Conference in Toronto, more popularly known as SecTor. Bourne is also president of CMS Consulting Inc.

Akamai - Security Podcast
Bill Brenner and Martin McKeay discuss web security

Akamai - Security Podcast

Play Episode Listen Later Dec 11, 2013 11:13


This week's episode is with Akamai Senior Security Advocate Martin McKeay. He's an old friend with more than a decade of experience in information security. At Akamai, he spreads awareness about security and privacy, helping customers understand our approach to both.

security web security bill brenner martin mckeay
Akamai - Security Podcast
Bill Brenner talks with Dave Lewis

Akamai - Security Podcast

Play Episode Listen Later Dec 4, 2013 12:21


In this episode of the Akamai Security Podcast, I talk to colleague, friend and Security Advocate Dave Lewis (@gattaca, on Twitter). We talk about the past, present and future of his Liquidmatrix site, life in his new role and the big issues he's helping customers address. We also talk about all the blogging he's doing over at CSOonline.com.

security web security dave lewis cso online bill brenner
Akamai - Security Podcast
Bill Brenner and Michael Smith discuss Akamai CSIRT - Part 2

Akamai - Security Podcast

Play Episode Listen Later Nov 6, 2013 7:03


Bill Brenner continues his discussion with CSIRT Director Michael Smith. In this installment, Mike describes the process by which CSIRT delivers daily threat intelligence to our customers, along with the defensive measures needed to block attacks.

Akamai - Security Podcast
Bill Brenner and Michael Smith discuss Akamai CSIRT

Akamai - Security Podcast

Play Episode Listen Later Oct 29, 2013 11:56


Bill Brenner interviews CSIRT Director Michael Smith. They discuss the role of CSIRT in researching threats and vulnerabilities, as well as keeping customers and the wider public informed of defensive measures they can take.

Akamai - Security Podcast
Larry Cashdollar discusses Akamai's CSIRT Team

Akamai - Security Podcast

Play Episode Listen Later Sep 23, 2013 7:34


Bill Brenner talks to Larry Cashdollar, a senior security response engineer on our CSIRT team. Larry discusses the mechanics of his job and the particular threats he and the team have been tracking and defending against.

Akamai - Security Podcast
Bill Brenner interviews Meg Grady-Troia

Akamai - Security Podcast

Play Episode Listen Later Sep 16, 2013 8:22


Bill Brenner talks to Meg Grady-Troia about her role in Akamai InfoSec, particularly the security training she does for new hires.

RadioTuck
Information Security Today and Predictions for the Near Future

RadioTuck

Play Episode Listen Later Aug 18, 2011 19:07


Bill Brenner, Senior Editor, CSO Magazine, CIOonline.com / IDG and Prof. Eric Johnson sat down before the Human Behavior and Security Culture Workshop to discuss the current state of information security. Topics covered include Wikileaks, company culture and cloud security.

Paul's Security Weekly
Shmoocon 2010 Podcaster Meetup

Paul's Security Weekly

Play Episode Listen Later Feb 15, 2010 56:41


Chaos. Intelligent Debate. Shmooball fights. Keg Stands. Educated Opinions. Thats right get all of that and more when you listen to the audio from the 2010 Shmoocon Podcaster Meetup! Here's what the press has to say: "The security podcasters’ meet-up on Saturday night was more like a Motley Crue concert than anything else. The podcasters on stage resembled the head table at a Klingon wedding. But drunken antics conference-wide were minimal, and some decent food for thought came out of the podcasting event despite the rowdiness." -- Bill Brenner, CSO Online "The podcasters meetup is like watching a bunch of monkeys fn a football with add!" -- "@secbarbie" You be the judge! Audio Feeds:

Paul's Security Weekly
Paul's Security Weekly - Episode 129 Part I - November 6, 2008

Paul's Security Weekly

Play Episode Listen Later Nov 8, 2008 55:28


In Part I of this week's episode we are joined by Bill Brenner, talking to us and the listeners about the best ways to sell security to upper management. In Part II we discuss stories and bring on none other than Josh Wright to talk about some of the latest attacks against TKIP. We are still working on the sound quality problems, swapped out a few cables this week and it helped. The intro to the show is messed up and Larry and I are only on the left channel, this does NOT persist throughout the entire episode. Please bare with us while we work towards better sound quality. Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Astaro, download a free trial of the Astaro Security gateway today! Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program Be sure to check out "Maltego" from Paterva, try the community edition for free! Don't forget to sign up for our Mailing List, Forums, and log into our IRC Channel! Full Show Notes Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian