Podcasts about binary defense

  • 26PODCASTS
  • 39EPISODES
  • 54mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 20, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about binary defense

Latest podcast episodes about binary defense

She Said Privacy/He Said Security
Inside Cybersecurity: How Hackers Think and How To Stop Them

She Said Privacy/He Said Security

Play Episode Listen Later Mar 20, 2025 34:34


David Kennedy is the Founder and CEO of TrustedSec and Co-founder at Binary Defense. He is considered an industry leader in cybersecurity. As the former Chief Security Officer of Diebold, David has led global cybersecurity teams, testified before Congress, and continues to shape cybersecurity policy. He co-authored the Penetration Testing Execution Standard and is renowned in offensive security. A Marine with intelligence experience, he prioritizes family, fitness, and co-hosts the Hacking Your Health Podcast. He built a DeLorean time machine inspired by Back to the Future. David's life mission is to help others and to make the world a safer place in cybersecurity, which drives him every single day. In this episode… Cybersecurity threats are evolving at an alarming rate, and businesses face an uphill battle in protecting their data and systems. Ransomware attacks, supply chain vulnerabilities, and sophisticated social engineering tactics put organizations at constant risk. At the same time, companies face mounting pressure to protect customer data amid the growing influence of AI-driven misinformation, concerns surrounding platforms like TikTok, and other evolving cyber threats. How can businesses defend themselves proactively? Building a strong cybersecurity program requires leadership, governance, and proactive risk management, not just technology. Many organizations struggle with detecting breaches in real time, making rapid threat detection and response essential. TrustedSec and Binary Defense are helping companies address these challenges by providing expert-led security consulting, penetration testing, and real-time threat monitoring. As cyber threats become more advanced, collaboration between security and privacy teams is essential to building a comprehensive defense strategy. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels chat with David Kennedy, Founder and CEO of TrustedSec and Co-founder at Binary Defense, about evolving cybersecurity threats and how businesses can improve their security posture. David talks about the intersection of cybersecurity and privacy, the role of governance in building cybersecurity resilience and protecting data, how AI is shaping cyber threats, and the implications of cyber warfare. He also shares his experience testifying before Congress, explaining why lawmakers struggle to grasp cybersecurity issues. David provides advice on how companies can improve their threat detection and response capabilities and why social media presents a growing risk.

Let's Talk About (Secur)IT
The Intricate World of Data Science: Angus Chen on AI and Cybersecurity

Let's Talk About (Secur)IT

Play Episode Listen Later Oct 28, 2024 50:30


Join us in this riveting episode as we explore Angus Chen's diverse career journey from mathematician to Director of Data Science at Binary Defense. With a rich background ranging from Johns Hopkins to the Federal Reserve and MITRE, Angus shares his insights into cybersecurity trends, AI, data privacy, and the impact of government frameworks. Hear about his experiences in China, the importance of Quality Assurance in data science, and how global travel has shaped his worldview. Beyond his professional achievements, Angus opens up about balancing work with his passions for trail running and rock climbing, showcasing the harmony between personal interests and professional life. This episode offers a thorough look at the intersections of technology and human experiences—don't miss it!

Paul's Security Weekly
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358

Paul's Security Weekly

Play Episode Listen Later Apr 18, 2024 107:19


Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann about how Binary Defense helps to protect the Cleveland Browns and other professional sports teams. This week, Adrian and Tyler discuss some crazy rumors - is it really possible that a cloud security startup valued at over $8 billion in November 2021 just got bought for $200 million??? Some healthy funding for Cyera and Cohesity ($300m and $150m, respectively) Onum, Alethea, Sprinto, Andesite AI, StrikeReady, YL-Backed Miggo, Nymiz, Salvador Technologies, and Simbian all raise smaller seed, A, or B rounds. Akamai picks up API security startup, Noname Security, Zscaler picks up Airgap networks, and it's rumored that Armis will acquire Silk Security for $150M. LimaCharlie seems to be doing some vertical growth, adding its own response and automation capabilities (what they call "bi-directional" capabilities). CISA releases a malware analysis system to the general public. Boostsecurity.io releases "poutine", an open source CI/CD pipeline vulnerability scanner. Some great essays this week, with Phil Venables' Letter from the Future, Ben Hawkes' Robots Dream of Root Shells, and Aileen Lee's 10 year Unicorn anniversary piece. We briefly discuss the 3rd party breach that affected Cisco Duo customers, and the financial impact of Change Healthcare's highly disruptive ransomware incident. Finally, we talk about the latest research on the security of LLMs and the apps using them. It's not looking great. For more details, check out the show notes here: https://www.scmagazine.com/podcast-episode/3188-enterprise-security-weekly-358 Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-358

Enterprise Security Weekly (Audio)
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 18, 2024 107:19


Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann about how Binary Defense helps to protect the Cleveland Browns and other professional sports teams. This week, Adrian and Tyler discuss some crazy rumors - is it really possible that a cloud security startup valued at over $8 billion in November 2021 just got bought for $200 million??? Some healthy funding for Cyera and Cohesity ($300m and $150m, respectively) Onum, Alethea, Sprinto, Andesite AI, StrikeReady, YL-Backed Miggo, Nymiz, Salvador Technologies, and Simbian all raise smaller seed, A, or B rounds. Akamai picks up API security startup, Noname Security, Zscaler picks up Airgap networks, and it's rumored that Armis will acquire Silk Security for $150M. LimaCharlie seems to be doing some vertical growth, adding its own response and automation capabilities (what they call "bi-directional" capabilities). CISA releases a malware analysis system to the general public. Boostsecurity.io releases "poutine", an open source CI/CD pipeline vulnerability scanner. Some great essays this week, with Phil Venables' Letter from the Future, Ben Hawkes' Robots Dream of Root Shells, and Aileen Lee's 10 year Unicorn anniversary piece. We briefly discuss the 3rd party breach that affected Cisco Duo customers, and the financial impact of Change Healthcare's highly disruptive ransomware incident. Finally, we talk about the latest research on the security of LLMs and the apps using them. It's not looking great. For more details, check out the show notes here: https://www.scmagazine.com/podcast-episode/3188-enterprise-security-weekly-358 Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-358

Paul's Security Weekly TV
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358

Paul's Security Weekly TV

Play Episode Listen Later Apr 18, 2024 41:09


Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann about how Binary Defense helps to protect the Cleveland Browns and other professional sports teams. Show Notes: https://securityweekly.com/esw-358

Enterprise Security Weekly (Video)
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 18, 2024 41:09


Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann about how Binary Defense helps to protect the Cleveland Browns and other professional sports teams. Show Notes: https://securityweekly.com/esw-358

Breaking Through in Cybersecurity Marketing
Partner Marketing: Strategies and Best Practices with Emily Cadwallader

Breaking Through in Cybersecurity Marketing

Play Episode Listen Later Jun 21, 2023 22:31


Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Emily Cadwallader, Partner Marketing Manager at Binary Defense, shares her expertise with Gianna and Maria.   Emily first joined Binary Defense as a marketing specialist wearing lots of hats. Once the company found its footing in channel strategy, Emily was able to focus all her efforts on that specific area. Channel marketing differs slightly from more traditional marketing, she explains, because it requires a more strategy-focused approach. When it comes to making things exciting, Emily believes that consistent contact with partners is super important. In terms of being there for marketing and collaboration, your partners can almost serve as an extension of your sales team.  Emily and her team at Binary Defense work closely with their partners to ensure they are involved in quarterly training and staying up to date with the latest offerings.    Among Binary Defense's partners include one tenure, several who are currently onboarding, and both regional and national partners. The first step of their most recent portal revamps was understanding what their ideal partner profile looked like. Next, Emily shares some of the company's most successful field events. If a partner already has their year of marketing strategy planned out for the year, it can be a great opportunity to tie in with them. Many partners have a cyber-specific day in which they come to evaluate their clients and prospects. Then, she elaborated on centralizing communications and activities and why it is so important for a successful partner program. These come in two forms: centralizing your communications internally and keeping consistent, open communication with your partners.     Emily received the Star Performer Award at Binary for her work as a partner marketer. She unpacks some of the qualities of someone who excels in partner marketing. First and foremost, you need to be a good communicator and have prior experience in the different avenues of marketing. This role can't be done alone, so the ability to collaborate with others is key. Finally, they engage in a fun guessing game to reveal what career Jennifer would pursue outside of the cybersecurity marketing field.   Links:   Follow Emily Cadwallader on LinkedIn. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Gianna on LinkedIn. Catch up with Maria on LinkedIn. Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.  

Twins Talk it Up Podcast
Twins Talk it Up Episode 138: Coffee Beans of Generosity

Twins Talk it Up Podcast

Play Episode Listen Later Mar 7, 2023 47:09


Are you looking for ways to unlock and maximize the potential of your employees and leadership teams? Make them feel supported. Investing in training, leadership development, mental and health wellness as just a few ways to accomplish this. Championing corporate philanthropy and giving back to communities and worthy causes is a smart business strategy. Employees want to work for companies that support causes they care about and increasingly customers want to purchase from companies that give back to their communities.Michael Mitchell speaks about the importance of supporting the causes that employees are most passionate about. Michael is a seasoned sales professional with Binary Defense and a Board Member of the HOFFA Foundation, a Maryland non-profit working to provide recovery resources, stable housing and employment services for those who are in the process of rebuilding their lives from addiction.HOFFA stands for Healing Opportunity Free From Addiction.Learn about the value of Purpose Driven Connections and using Connections Cards.Impact your community and speak to your leaders about workplace giving, matching gifts, sponsorships and volunteer programs. Be an organization that is known to be generous. Order a bag of HOFFA Beans today. To support The Hoffa Foundation, visit HOFFAFoundation.org--- more ---If you are looking to learn the art of audience engagement while listening for methods to conquer speaking anxiety, deliver persuasive presentations, and close more deals, then this is the podcast for you.Twins Talk it Up is a podcast where identical twin brothers Danny Suk Brown and David Suk Brown discuss leadership communication strategies to support professionals who believe in the power of their own authentic voice. Together, we will explore tips and tools to increase both your influence and value. Along the way, let's crush some goals, deliver winning sales pitches, and enjoy some laughs.Danny Suk Brown and David Suk Brown train on speaking and presentation skills. They also share from their keynote entitled, “Identically Opposite: the Pursuit of Identity”.Support and Follow us:YouTube: youtube.com/channel/UCL18KYXdzVdzEwMH8uwLf6gInstagram: @twinstalkitupInstagram: @dsbleadershipgroupTwitter: @dsbleadershipLinkedIn: linkedin.com/company/twins-talk-it-up/LinkedIn: linkedin.com/company/dsbleadershipgroup/Facebook: facebook.com/TwinsTalkitUpFacebook: facebook.com/dsbleadership/Website: dsbleadershipgroup.com/TwinsTalkitUp

The Imposter Syndrome Network Podcast
Dave Kennedy

The Imposter Syndrome Network Podcast

Play Episode Play 60 sec Highlight Listen Later Feb 28, 2023 36:59 Transcription Available


Our guest today is Dave Kennedy, Founder of Binary Defense and TrustedSec.We will discuss Dave's work as well as the struggles and challenges he encountered when starting his own business.He'll tells us about the importance that social media has on his life and how it helped him as an entrepreneur.Dave explains to us the importance that health and fitness have in his life the motivation behind his podcast on the subject.He'll  share his thoughts on failure, his most embarrassing mistake, and how he came to have a tweet from Dwayne "the Rock "Johnson on his  wall.-Things that you can focus on, home in on, and enjoy doing, those things you will be highly successful in anything that you do and accomplish. Because if you believe in yourself, you're going to be successful.-Dave's Links:TwitterLinkedInWe Hack Health (Podcast)Binary Defense (MSSP)Trusted Security (consulting)--Thanks for being an imposter - a part of the Imposter Syndrome Network (ISN)! We'd love it if you connected with us at the links below: The ISN LinkedIn group (community): https://www.linkedin.com/groups/14098596/ The ISN on Twitter: https://twitter.com/ImposterNetwork Zoë on Twitter: https://twitter.com/RoseSecOps Chris on Twitter: https://twitter.com/ChrisGrundemann Make it a great day.

Cybercrime Magazine Podcast
Small-To-Midsize Businesses. Meeting Their Cybersecurity Needs. Sponsored By Conceal.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 3, 2023 20:11


In this episode of Cybercrime Radio, host Steve Morgan is joined by Gordon Lawson, CEO at Conceal, and Bob Meindl, CEO at Binary Defense, a leading provider of managed detection and response, counterintelligence, and threat hunting services. Together, they discuss small-to-midsize businesses and meeting their needs as it relates to cybersecurity. To learn more about our sponsor, visit https://conceal.io

ITSPmagazine | Technology. Cybersecurity. Society
A Conversation With Threat Hunter And Counter Intelligence Expert Randy Pargman | The Hacker Factory Podcast With Phillip Wylie

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 5, 2022 43:55


Randy shares his experience as an intern and how it made a big impact on his career and led to a 15 year FBI career, and later to the public sector working for Binary Defense._______________________GuestRandy PargmanVP of Threat Hunting & Counterintelligence at Binary Defense [@Binary_Defense]On Twitter | https://twitter.com/rpargmanOn LinkedIn | https://www.linkedin.com/in/randy-pargman-131b773/______________________HostPhillip WylieOn ITSPmagazine  

The Hacker Factory
A Conversation With Threat Hunter And Counter Intelligence Expert Randy Pargman | The Hacker Factory Podcast With Phillip Wylie

The Hacker Factory

Play Episode Listen Later Aug 5, 2022 43:55


Randy shares his experience as an intern and how it made a big impact on his career and led to a 15 year FBI career, and later to the public sector working for Binary Defense._______________________GuestRandy PargmanVP of Threat Hunting & Counterintelligence at Binary Defense [@Binary_Defense]On Twitter | https://twitter.com/rpargmanOn LinkedIn | https://www.linkedin.com/in/randy-pargman-131b773/______________________HostPhillip WylieOn ITSPmagazine  

Cyber Pro Podcast
#183 - Edna Jonsson - SOC Analyst - Binary Defense

Cyber Pro Podcast

Play Episode Listen Later May 17, 2022 7:15


Edna joins us today and discusses the importance of getting more hands on training during cyber security education. The education process is heavy knowledge base, book learning, and testing, but overlooking the invaluable experience of exposure to different systems. She touches on the importance of cyber security to build and maintain consumer trust for the business you work with and for. Edna goes on to emphasis the importance of building resiliency through being brave and tackling new tech and systems heads on. The more you jump into the unknown, the better and more comfortable you are with it. This allows you to approach this experience going forward. Embrace failure as a part of learning, don't be deterred by it.   Connect with Edna: https://www.linkedin.com/in/ednajonsson/#experience  Visit her website: http://edna.tech/  Visit Binary Defense: https://www.binarydefense.com/  Visit WGU: https://www.wgu.edu/    Visit Short Arms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw/featured  Twitter: https://twitter.com/ShortArmSAS  

Cyber Pro Podcast
#183 - Edna Jonsson - SOC Analyst - Binary Defense

Cyber Pro Podcast

Play Episode Listen Later May 17, 2022 7:14


Edna joins us today and discusses the importance of getting more hands on training during cyber security education. The education process is heavy knowledge base, book learning, and testing, but overlooking the invaluable experience of exposure to different systems. She touches on the importance of cyber security to build and maintain consumer trust for the business you work with and for. Edna goes on to emphasis the importance of building resiliency through being brave and tackling new tech and systems heads on. The more you jump into the unknown, the better and more comfortable you are with it. This allows you to approach this experience going forward. Embrace failure as a part of learning, don't be deterred by it.   Connect with Edna: https://www.linkedin.com/in/ednajonsson/#experience  Visit her website: http://edna.tech/  Visit Binary Defense: https://www.binarydefense.com/  Visit WGU: https://www.wgu.edu/    Visit Short Arms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw/featured  Twitter: https://twitter.com/ShortArmSAS  

Women Who Code Radio
Episode 42: Restoring Your Mental Health - Balancing Kids and Code - Mom's Talk Tech

Women Who Code Radio

Play Episode Listen Later May 11, 2022 121:50


Women Who Code Talks Tech: May 10th was Mental Health Day, and we want to encourage everyone to prioritize looking after their mental health. In this edition of Women Who Code Talks Tech we have Courtney Shelby, Owner of the Thrive Wellness Group, talking about different techniques that engineers can use to restore their mental health and create a resilient mindset. Women Who Code Conversations: For this weeks Women Who Code Conversations we're celebrating Mother's Day, with a conversation between two amazing Mothers who are leaders in the technology industry; Joey Rosenberg, President of Product and Communications at Women Who Code, and Ivonne Aldana, Director of Engineering at Toptal.They discuss how motherhood has affected their careers and how they've managed to find a healthy work-life balance while pursuing their dreams. Enjoy! Women Who Code Career Nav: For Women Who Code Career Nav this week we're highlighting a discussion entitled Mothers in Tech: Balancing Kids and Code, with Eileen Cerny, retired Master Software Engineer at Capital One, Alison Meehan, Security Operations Center Analyst at Binary Defense, and Hayley Ortega, Head of Product at Ippon Technologies.

Lay of The Land
#67: David Kennedy (Binary Defense and TrustedSec)

Lay of The Land

Play Episode Listen Later Mar 31, 2022 52:20


Our guest today is Dave Kennedy (@HackingDave), a cybersecurity authority whose mission is to drive the industry forward and make the world a more secure place. In addition to founding two large-scale cybersecurity firms — TrustedSec and Binary defense — Dave has testified before Congress on issues of national security and has appeared as a subject matter expert on hundreds of national news and TV shows.Dave started his career serving in the United States Marine Corps focusing on cyber warfare and forensic analytics, including two tours to Iraq. All experience he was able to leverage to become Chief Security Officer for Diebold — a fortune-1000-company based here in northeast Ohio.In 2012, Dave left Diebold to found TrustedSec — an information security consulting company — and sister company, Binary Defense which is a full-service 24/7/365 monitoring and detection company that focuses on the detection of attackers in its early stages. Simultaneously, Dave started the DerbyCon which became one of the highest regarded and attended security conferences in the industry over its tenure.Dave is a true cybersecurity champion — online, he goes by his @hackingdave handle where he has over 150,000 followers across social media; he's served as an advisor to the hit TV show Mr. Robot, and he is the co-author of Metasploit: The Penetration Tester's Guide, co-creator of the Penetration Testing Execution Standard (PTES), and creator of the Social Engineer Toolkit (SET).Really special to hear Dave's story and learn about the incredible organizations he's founded and grown here in Cleveland — please enjoy my conversation with Dave Kennedy!--Follow Dave Kennedy on Twitter @HackingDaveConnect with Dave on LinkedInLearn more about Binary DefenseLearn more about TrustedSecFollow TrustedSec on TwitterFollow Binary Defense on Twitter

8th Layer Insights
Embrace an Attacker Mindset to Improve Security

8th Layer Insights

Play Episode Listen Later Aug 3, 2021 63:59


Have you ever taken time to view the world through the eyes of an attacker? Doing so is an interesting and useful exercise. Understanding the mind of an attacker is fundamental to securing your organization or aspects of your personal life. After all, if you aren't doing the job of viewing things from an attacker's perspective, that means that only the attackers are. The idea is to understand the mindset, motivations, and capabilities of a possible threat actor so that you aren't simply oblivious to your vulnerabilities.  This episode is a deep dive into attacker mindsets, we'll hear from four experts who really know what it is to view the world through the eyes of an attacker. Featuring Chris Kirsch (DEF CON Social Engineering CTF Black Badge winner and co-founder of Rumble, Inc.), David Kennedy (Founder of Binary Defense and TrustedSec), Maxie Reynolds (Author of The Art of Attack: Attacker Mindset for Security Professionals, and Technical Team Leader, Social-Engineer, LLC), and Ted Harrington (Author of Hackable: How to Do Application Security Right, and Executive Partner at Independent Security Evaluators). Guests: Maxie Reynolds (https://www.linkedin.com/in/maxiereynolds/) David Kennedy (https://www.linkedin.com/in/davidkennedy4/) Chris Kirsch (https://www.linkedin.com/in/ckirsch/) Ted Harrington (https://www.linkedin.com/in/securityted/) Books and References: Bruce Schneier blog about the Security Mindset: https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html Origin of "Devil's Advocate": https://allthatsinteresting.com/devils-advocate-origin Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html What is Threat Modeling: https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/ 12 Methods of threat Modeling: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/ The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds Hackable: How to Do Application Security Right by Ted Harrington The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick Threat Modeling: Designing for Security by Adam Shostack Threat Modeling: A Practical Guide for Development Teams by Izar Tarandach and Matthew J. Coles Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter Music and Sound Effects by Blue Dot Sessions & Storyblocks. Artwork by Chris Machowski.

The Cybrary Podcast
401 Access Denied Ep. 32 | Best Practices on Penetration Testing with Dave Kennedy

The Cybrary Podcast

Play Episode Listen Later Jul 14, 2021 58:23 Transcription Available


In this episode of 401 Access Denied, Dave Kennedy, CEO of Binary Defense and TrustedSec, and co-author of Metasploit: The Penetration Testers Guide joins the 401 team to talk about penetration testing. We uncover invaluable lessons from a master in the industry.

Petey Podcast
Halt the Hackers!

Petey Podcast

Play Episode Listen Later Apr 23, 2021 48:38


Stop reusing passwords! Simple steps like this will help cut your risk of falling victim to online hackers and identity thieves.  Internet security expert Jim Kennedy of Binary Defense joins us on this episode of Petey Podcast with tips for safeguarding your personal and professional self.  Binary Defense provides internet security services to the Elyria Schools and Kennedy is an internet professional with the district. 

The Catalyst by Softchoice
The hack that changed everything

The Catalyst by Softchoice

Play Episode Listen Later Apr 14, 2021 32:57 Transcription Available


The year 2020 was one of many turning points in the IT industry, so when it comes to cybersecurity, you'd hope there were some silver linings, right? Well, we might have some bad news. In the year since the global pandemic hit, hackers have gotten more sophisticated and dangerous. In this episode, David Kennedy, renowned cybersecurity leader and best-selling author, returns to the podcast to take a look at the major SolarWinds attack, the new obstacles for IT and best practices for securing your people, data and customer relationships. Featuring:   David Kennedy, co-founder at Binary Defense and Trusted Sec Special appearances by:   Rebecca Martinez, Senior Enterprise Account Leader, Softchoice  Ryan Demelo, Solutions Marketing Manager, Cloud Portfolio at Softchoice  Christopher Payne, Territory Sales Leader, Softchoice  The Catalyst by Softchoice is the podcast shining a light on the human side of IT leaders and reframing our relationship with technology.   Are you a leader in the IT space? Read more on Softchoice's Innovation Executive Forum, an exclusive, members-only community of over 400 senior IT leaders across North America.  

Know Your Adversary
Selling Backdoor Access to a Managed Service Provider

Know Your Adversary

Play Episode Listen Later Mar 24, 2021 30:06


In Episode 2 of Know Your Adversary, we discuss an attempted compromise of a managed service provider (MSP) by a disgruntled former employee who tried to sell backdoor access on the dark web. Our guest is former Senior FBI Computer Scientist and current VP of Threat Hunting & Counterintelligence at Binary Defense, Randy Pargman.  In 2019, Binary Defense engaged with an actor selling backdoor, unauthorized, and illegal access to an MSP in the eastern United States. The MSP provided out-source IT functions for many companies, and a compromise of their systems would have a major impact on hundreds of their clients. The actor, who identified himself only as “W0zniak,” attempted to sell the username and password for $600. In order to ensure confidentiality and proper legal engagement, Binary Defense coordinated with the FBI to properly conduct a “controlled purchase” of the credentials, inform the MSP, prevent any other threat actor from buying or accessing the MSP with the same credentials, help the FBI attribute and unmask the individual, and bring the actor to justice.  Here are some of the key takeaways from the episode.  Threat Actors Sell Access to Victim Networks using a Variety of Methods. In most cases, actors typically fall into several groups. Those that sell access, buy access, gain access and persist (ransomware, espionage, etc.), steal valuable information, and facilitate the payment(s) can all be different individuals or groups. In this case, a former employee created credentials with the intent to sell to another criminal(s). Unfortunately, he sold them to the good guys, Binary Defense and the FBI. The Case for More Aggressive Attribution and Unmasking of Adversaries. An enterprise often needs to have the ability to determine if an attack is a target of opportunity (drive-by scam or smash and grab) or well-orchestrated and directed with a specific purpose in mind (insider threat, espionage to gain information, targeted fraud, and ransomware). When it’s clear an enterprise is under a direct assault, unmasking identities for attribution is often warranted in order to disrupt the attack and identify the perpetrator. Selling unauthorized access that could impact hundreds of other commercial victims justifies unmasking at the identity level to prevent the initial and potential subsequent attacks.

Low Voltage Nation Podcast
MSP Weekly - New Year New Partners

Low Voltage Nation Podcast

Play Episode Listen Later Jan 19, 2021 76:07


In this episode we announce a partnership with Binary Defense as our cybersecurity partners with Low Voltage Nation https://binarydefense.com --- Send in a voice message: https://anchor.fm/lowvoltagenation/message Support this podcast: https://anchor.fm/lowvoltagenation/support

new year new partners binary defense
The Catalyst by Softchoice
Strengthening the End-User – It's Cybersecurity Awareness Month!

The Catalyst by Softchoice

Play Episode Listen Later Oct 8, 2020 32:09 Transcription Available


The global pandemic has forced businesses to evolve at lightspeed - not something most security and compliance professionals are huge fans of! As opportunistic attacks continue to rise and hackers get worse, should everyday people really be the last defense? Erika sits down with cybersecurity leader, David Kennedy, to discuss how the disruptions of COVID19 has changed the game for security professionals, the average Joe, and hackers alike. Featuring: David Kennedy, Founder and CTO at Binary Defense and TrustedSec Special appearances by: Nicole Francis, Content Operations Senior Manager at Softchoice Saad Afsar, Digital Marketing Senior Manager at Softchoice Richard Carson, Solutions Marketing Manager at Softchoice Aine White, Marketing Programs Manager at Softchoice ---The Catalyst by Softchoice is the podcast that is shining a light on the human side of IT leaders and reframing our relationship with technology. Are you a leader in the IT space? Read more on Softchoice's Innovation Executive Forum, an exclusive, members-only community of over 400 senior IT leaders across North America. 

Tribe of Hackers Podcast
Dave Kennedy, aka @HackingDave

Tribe of Hackers Podcast

Play Episode Listen Later Sep 7, 2020 52:33


This is a special Labor Day Quick Release celebrating the anniversary of Derbycon.Rural Tech Fund: https://ruraltechfund.org/Dave Kennedy has worked on cyberwarfare for the U.S. Marine Corps (USMC) and on forensics for theintelligence community, including two tours in Iraq. He has also served as the chief security officer (CSO) for a Fortune 1000 company with offices in more than 77 countries. Then one day, he left that job and started his own. He is the founder of TWO companies, TrustedSec and Binary Defense. If you are an NBA fan, you might even see a logo from time to time. He is also the founder of Derbycon, author of UNICORN, and the Social Engineering Toolkit, has testified before congress several times, has been on TV nearly a hundred times, and is absolutely terrified bye clowns

Security Nation
How Security Pro Dave Kennedy Keeps His InfoSec Skills Sharp While Telecommuting

Security Nation

Play Episode Listen Later Aug 14, 2020 50:51


In our latest episode of Security Nation, Dave Kennedy, founder of the cybersecurity firms TrustedSec and Binary Defense, stopped by to discuss how he’s staying busy while working from home during the pandemic. Wrangling dogs and keeping his skills sharp on Red Team engagements are a major part of the story. Stick around for our Rapid Rundown, where Tod talks about a fascinating attack he learned about at virtual Black Hat called EtherOops, as well as implications around election security that were discussed during the event.

This Week in Tech with Jeanne Destro
This Week in Tech with Jeanne Destro-2-14-20

This Week in Tech with Jeanne Destro

Play Episode Listen Later Feb 14, 2020


This week, cybersecurity in the spotlight, as the US Government charges four members of the Chinese military with espionage, for hacking the giant credit reporting company, Equifax. We'll also talk to the CEO of Trusted Sec, and Binary Defense, about their plans to expand in the Akron area.

This Week in Tech with Jeanne Destro
This Week in Tech with Jeanne Destro-2-14-20

This Week in Tech with Jeanne Destro

Play Episode Listen Later Feb 14, 2020


This week, cybersecurity in the spotlight, as the US Government charges four members of the Chinese military with espionage, for hacking the giant credit reporting company, Equifax. We’ll also talk to the CEO of Trusted Sec, and Binary Defense, about their plans to expand in the Akron area.

Low Voltage Nation Podcast
6.0 Dave Kennedy Founder of Binary Defense and TrustedSec Fireside Chat

Low Voltage Nation Podcast

Play Episode Listen Later Jan 12, 2020 48:55


Blake Urmos interviews Dave Kennedy, founder of TrustedSec, Binary Defense, and DerbyCon. We dive into Dave's service as a United States Marine, working for Diebold as Chief Security Officer, and how he left his dream job to create some of the best information security companies in the world. --- Send in a voice message: https://anchor.fm/lowvoltagenation/message Support this podcast: https://anchor.fm/lowvoltagenation/support

Low Voltage Nation Podcast
5.0 Brandon Weber TSC IT Fireside Chat

Low Voltage Nation Podcast

Play Episode Listen Later Dec 1, 2019 56:20


Brandon Weber and Blake Urmos talk about MSP's, Passportal, Datto, Autotask, and Binary Defense. https://www.instagram.com/tsc.it/ --- Send in a voice message: https://anchor.fm/lowvoltagenation/message Support this podcast: https://anchor.fm/lowvoltagenation/support

fireside chat msp datto binary defense autotask brandon weber
Enterprise Security Weekly (Video)
Dave Kennedy, Binary Defense - Enterprise Security Weekly #134

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 27, 2019 23:19


Security Legend Dave Kennedy sits down with our Founder and CTO Paul Asadoorian at InfoSec World 2019 to discuss his company Binary Defense and how they're helping the Security community! A great conversation between two security legends and long time best friends! Full Show Notes: https://wiki.securityweekly.com/ES_Episode134 Visit https://securityweekly.com/esw for all the latest episodes!

founders security legendary enterprise best friends dave kennedy infosec world paul asadoorian binary defense enterprise security weekly infosecworld2019 es episode134 visit security legend dave kennedy
Paul's Security Weekly TV
Dave Kennedy, Binary Defense - Enterprise Security Weekly #134

Paul's Security Weekly TV

Play Episode Listen Later Apr 27, 2019 23:19


Security Legend Dave Kennedy sits down with our Founder and CTO Paul Asadoorian at InfoSec World 2019 to discuss his company Binary Defense and how they're helping the Security community! A great conversation between two security legends and long time best friends! Full Show Notes: https://wiki.securityweekly.com/ES_Episode134 Visit https://securityweekly.com/esw for all the latest episodes!

founders security legendary enterprise best friends dave kennedy infosec world paul asadoorian binary defense enterprise security weekly infosecworld2019 es episode134 visit security legend dave kennedy
Enterprise Security Weekly (Audio)
Creativity Points - Enterprise Security Weekly #134

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 25, 2019 80:48


This week, Paul Asadoorian is joined by Matt Alderman, as we interview Francis Dinha, the CEO of OpenVPN! In the Enterprise News, ShieldX adds lateral movement prevention to the Elastic Security Platform for AWS, Tenable Integrates with Google Cloud Security Command Center, Capsule8 to help Google Cloud SCC members consolidate findings and speed up response, and Evident and Okta partnership simplifies identity verification and reduces risk for businesses! In the final segment, Security Legend Dave Kennedy sits down with our Founder and CTO Paul Asadoorian at InfoSec World 2019 to discuss his company Binary Defense and how they're helping the Security community!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode134 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

ceo founders creativity security points legendary enterprise best friends aws google cloud okta scc evident tenable command center command conquer openvpn dave kennedy infosec world paul asadoorian binary defense capsule8 enterprise security weekly matt alderman enterprise news francis dinha shieldx google cloud scc security legend dave kennedy es episode134 visit elastic security platform
Paul's Security Weekly
Creativity Points - Enterprise Security Weekly #134

Paul's Security Weekly

Play Episode Listen Later Apr 25, 2019 80:48


This week, Paul Asadoorian is joined by Matt Alderman, as we interview Francis Dinha, the CEO of OpenVPN! In the Enterprise News, ShieldX adds lateral movement prevention to the Elastic Security Platform for AWS, Tenable Integrates with Google Cloud Security Command Center, Capsule8 to help Google Cloud SCC members consolidate findings and speed up response, and Evident and Okta partnership simplifies identity verification and reduces risk for businesses! In the final segment, Security Legend Dave Kennedy sits down with our Founder and CTO Paul Asadoorian at InfoSec World 2019 to discuss his company Binary Defense and how they're helping the Security community!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode134 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

ceo founders creativity security points legendary enterprise best friends aws google cloud okta scc evident tenable command center command conquer openvpn dave kennedy infosec world paul asadoorian binary defense capsule8 enterprise security weekly matt alderman enterprise news francis dinha shieldx google cloud scc security legend dave kennedy es episode134 visit elastic security platform
BSD Now
Episode 261: FreeBSDcon Flashback | BSD Now 261

BSD Now

Play Episode Listen Later Aug 30, 2018 109:13


Insight into TrueOS and Trident, stop evildoers with pf-badhost, Flashback to FreeBSDcon ‘99, OpenBSD’s measures against TLBleed, play Morrowind on OpenBSD in 5 steps, DragonflyBSD developers shocked at Threadripper performance, and more. ##Headlines An Insight into the Future of TrueOS BSD and Project Trident Last month, TrueOS announced that they would be spinning off their desktop offering. The team behind the new project, named Project Trident, have been working furiously towards their first release. They did take a few minutes to answer some of our question about Project Trident and TrueOS. I would like to thank JT and Ken for taking the time to compile these answers. It’s FOSS: What is Project Trident? Project Trident: Project Trident is the continuation of the TrueOS Desktop. Essentially, it is the continuation of the primary “TrueOS software” that people have been using for the past 2 years. The continuing evolution of the entire TrueOS project has reached a stage where it became necessary to reorganize the project. To understand this change, it is important to know the history of the TrueOS project. Originally, Kris Moore created PC-BSD. This was a Desktop release of FreeBSD focused on providing a simple and user-friendly graphical experience for FreeBSD. PC-BSD grew and matured over many years. During the evolution of PC-BSD, many users began asking for a server focused version of the software. Kris agreed, and TrueOS was born as a scaled down server version of PC-BSD. In late 2016, more contributors and growth resulted in significant changes to the PC-BSD codebase. Because the new development was so markedly different from the original PC-BSD design, it was decided to rebrand the project. TrueOS was chosen as the name for this new direction for PC-BSD as the project had grown beyond providing only a graphical front to FreeBSD and was beginning to make fundamental changes to the FreeBSD operating system. One of these changes was moving PC-BSD from being based on each FreeBSD Release to TrueOS being based on the active and less outdated FreeBSD Current. Other major changes are using OpenRC for service management and being more aggressive about addressing long-standing issues with the FreeBSD release process. TrueOS moved toward a rolling release cycle, twice a year, which tested and merged FreeBSD changes directly from the developer instead of waiting months or even years for the FreeBSD review process to finish. TrueOS also deprecated and removed obsolete technology much more regularly. As the TrueOS Project grew, the developers found these changes were needed by other FreeBSD-based projects. These projects began expressing interest in using TrueOS rather than FreeBSD as the base for their project. This demonstrated that TrueOS needed to again evolve into a distribution framework for any BSD project to use. This allows port maintainers and source developers from any BSD project to pool their resources and use the same source repositories while allowing every distribution to still customize, build, and release their own self-contained project. The result is a natural split of the traditional TrueOS team. There were now naturally two teams in the TrueOS project: those working on the build infrastructure and FreeBSD enhancements – the “core” part of the project, and those working on end-user experience and utility – the “desktop” part of the project. When the decision was made to formally split the projects, the obvious question that arose was what to call the “Desktop” project. As TrueOS was already positioned to be a BSD distribution platform, the developers agreed the desktop side should pick a new name. There were other considerations too, one notable being that we were concerned that if we continued to call the desktop project “TrueOS Desktop”, it would prevent people from considering TrueOS as the basis for their distribution because of misconceptions that TrueOS was a desktop-focused OS. It also helps to “level the playing field” for other desktop distributions like GhostBSD so that TrueOS is not viewed as having a single “blessed” desktop version. It’s FOSS: What features will TrueOS add to the FreeBSD base? Project Trident: TrueOS has already added a number of features to FreeBSD: OpenRC replaces rc.d for service management LibreSSL in base Root NSS certificates out-of-box Scriptable installations (pc-sysinstall) The full list of changes can be seen on the TrueOS repository (https://github.com/trueos/trueos/blob/trueos-master/README.md). This list does change quite regularly as FreeBSD development itself changes. It’s FOSS: I understand that TrueOS will have a new feature that will make creating a desktop spin of TrueOS very easy. Could you explain that new feature? Project Trident: Historically, one of the biggest hurdles for creating a desktop version of FreeBSD is that the build options for packages are tuned for servers rather than desktops. This means a desktop distribution cannot use the pre-built packages from FreeBSD and must build, use, and maintain a custom package repository. Maintaining a fork of the FreeBSD ports tree is no trivial task. TrueOS has created a full distribution framework so now all it takes to create a custom build of FreeBSD is a single JSON manifest file. There is now a single “source of truth” for the source and ports repositories that is maintained by the TrueOS team and regularly tagged with “stable” build markers. All projects can use this framework, which makes updates trivial. It’s FOSS: Do you think that the new focus of TrueOS will lead to the creation of more desktop-centered BSDs? Project Trident: That is the hope. Historically, creating a desktop-centered BSD has required a lot of specialized knowledge. Not only do most people not have this knowledge, but many do not even know what they need to learn until they start troubleshooting. TrueOS is trying to drastically simplify this process to enable the wider Open Source community to experiment, contribute, and enjoy BSD-based projects. It’s FOSS: What is going to happen to TrueOS Pico? Will Project Trident have ARM support? Project Trident: Project Trident will be dependent on TrueOS for ARM support. The developers have talked about the possibility of supporting ARM64 and RISC-V architectures, but it is not possible at the current time. If more Open Source contributors want to help develop ARM and RISC-V support, the TrueOS project is definitely willing to help test and integrate that code. It’s FOSS: What does this change (splitting Trus OS into Project Trident) mean for the Lumina desktop environment? Project Trident: Long-term, almost nothing. Lumina is still the desktop environment for Project Trident and will continue to be developed and enhanced alongside Project Trident just as it was for TrueOS. Short-term, we will be delaying the release of Lumina 2.0 and will release an updated version of the 1.x branch (1.5.0) instead. This is simply due to all the extra overhead to get Project Trident up and running. When things settle down into a rhythm, the development of Lumina will pick up once again. It’s FOSS: Are you planning on including any desktop environments besides Lumina? Project Trident: While Lumina is included by default, all of the other popular desktop environments will be available in the package repo exactly as they had been before. It’s FOSS: Any plans to include Steam to increase the userbase? Project Trident: Steam is still unavailable natively on FreeBSD, so we do not have any plans to ship it out of the box currently. In the meantime, we highly recommend installing the Windows version of Steam through the PlayOnBSD utility. It’s FOSS: What will happen to the AppCafe? Project Trident: The AppCafe is the name of the graphical interface for the “pkg” utility integrated into the SysAdm client created by TrueOS. This hasn’t changed. SysAdm, the graphical client, and by extension AppCafe are still available for all TrueOS-based distributions to use. It’s FOSS: Does Project Trident have any corporate sponsors lined up? If not, would you be open to it or would you prefer that it be community supported? Project Trident: iXsystems is the first corporate sponsor of Project Trident and we are always open to other sponsorships as well. We would prefer smaller individual contributions from the community, but we understand that larger project needs or special-purpose goals are much more difficult to achieve without allowing larger corporate sponsorships as well. In either case, Project Trident is always looking out for the best interests of the community and will not allow intrusive or harmful code to enter the project even if a company or individual tries to make that code part of a sponsorship deal. It’s FOSS: BSD always seems to be lagging in terms of support for newer devices. Will TrueOS be able to remedy that with a quicker release cycle? Project Trident: Yes! That was a primary reason for TrueOS to start tracking the CURRENT branch of FreeBSD in 2016. This allows for the changes that FreeBSD developers are making, including new hardware support, to be available much sooner than if we followed the FreeBSD release cycle. It’s FOSS: Do you have any idea when Project Trident will have its first release? Project Trident: Right now we are targeting a late August release date. This is because Project Trident is “kicking the wheels” on the new TrueOS distribution system. We want to ensure everything is working smoothly before we release. Going forward, we plan on having regular package updates every week or two for the end-user packages and a new release of Trident with an updated OS version every 6 months. This will follow the TrueOS release schedule with a small time offset. ###pf-badhost: Stop the evil doers in their tracks! pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet’s biggest irritants. Annoyances such as ssh bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts. Filtering performance is exceptional, as the badhost list is stored in a pf table. To quote the OpenBSD FAQ page regarding tables: “the lookup time on a table holding 50,000 addresses is only slightly more than for one holding 50 addresses.” pf-badhost is simple and powerful. The blocklists are pulled from quality, trusted sources. The ‘Firehol’, ‘Emerging Threats’ and ‘Binary Defense’ block lists are used as they are popular, regularly updated lists of the internet’s most egregious offenders. The pf-badhost.sh script can easily be expanded to use additional or alternate blocklists. pf-badhost works best when used in conjunction with unbound-adblock for the ultimate badhost blocking. Notes: If you are trying to run pf-badhost on a LAN or are using NAT, you will want to add a rule to your pf.conf appearing BEFORE the pf-badhost rules allowing traffic to and from your local subnet so that you can still access your gateway and any DNS servers. Conversely, adding a line to pf-badhost.sh that removes your subnet range from the table should also work. Just make sure you choose a subnet range / CIDR block that is actually in the list. 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8 are the most common home/office subnet ranges. DigitalOcean https://do.co/bsdnow ###FLASHBACK: FreeBSDCon’99: Fans of Linux’s lesser-known sibling gather for the first time FreeBSD, a port of BSD Unix to Intel, has been around almost as long as Linux has – but without the media hype. Its developer and user community recently got a chance to get together for the first time, and they did it in the city where BSD – the Berkeley Software Distribution – was born some 25 years ago. October 17, 1999 marked a milestone in the history of FreeBSD – the first FreeBSD conference was held in the city where it all began, Berkeley, CA. Over 300 developers, users, and interested parties attended from around the globe. This was easily 50 percent more people than the conference organizers had expected. This first conference was meant to be a gathering mostly for developers and FreeBSD advocates. The turnout was surprisingly (and gratifyingly) large. In fact, attendance exceeded expectations so much that, for instance, Kirk McKusick had to add a second, identical tutorial on FreeBSD internals, because it was impossible for everyone to attend the first! But for a first-ever conference, I was impressed by how smoothly everything seemed to go. Sessions started on time, and the sessions I attended were well-run; nothing seemed to be too cold, dark, loud, late, or off-center. Of course, the best part about a conference such as this one is the opportunity to meet with other people who share similar interests. Lunches and breaks were a good time to meet people, as was the Tuesday night beer bash. The Wednesday night reception was of a type unusual for the technical conferences I usually attend – a three-hour Hornblower dinner cruise on San Francisco Bay. Not only did we all enjoy excellent food and company, but we all got to go up on deck and watch the lights of San Francisco and Berkeley as we drifted by. Although it’s nice when a conference attracts thousands of attendees, there are some things that can only be done with smaller groups of people; this was one of them. In short, this was a tiny conference, but a well-run one. Sessions Although it was a relatively small conference, the number and quality of the sessions belied the size. Each of the three days of the conference featured a different keynote speaker. In addition to Jordan Hubbard, Jeremy Allison spoke on “Samba Futures” on day two, and Brian Behlendorf gave a talk on “FreeBSD and Apache: A Perfect Combo” to start off the third day. The conference sessions themselves were divided into six tracks: advocacy, business, development, networking, security, and panels. The panels track featured three different panels, made up of three different slices of the community: the FreeBSD core team, a press panel, and a prominent user panel with representatives from such prominent commercial users as Yahoo! and USWest. I was especially interested in Apple Computer’s talk in the development track. Wilfredo Sanchez, technical lead for open source projects at Apple (no, that’s not an oxymoron!) spoke about Apple’s Darwin project, the company’s operating system road map, and the role of BSD (and, specifically, FreeBSD) in Apple’s plans. Apple and Unix have had a long and uneasy history, from the Lisa through the A/UX project to today. Personally, I’m very optimistic about the chances for the Darwin project to succeed. Apple’s core OS kernel team has chosen FreeBSD as its reference platform. I’m looking forward to what this partnership will bring to both sides. Other development track sessions included in-depth tutorials on writing device drivers, basics of the Vinum Volume Manager, Fibre Channel, development models (the open repository model), and the FreeBSD Documentation Project (FDP). If you’re interested in contributing to the FreeBSD project, the FDP is a good place to start. Advocacy sessions included “How One Person Can Make a Difference” (a timeless topic that would find a home at any technical conference!) and “Starting and Managing A User Group” (trials and tribulations as well as rewards). The business track featured speakers from three commercial users of FreeBSD: Cybernet, USWest, and Applix. Applix presented its port of Applixware Office for FreeBSD and explained how Applix has taken the core services of Applixware into open source. Commercial applications and open source were once a rare combination; we can only hope the trend away from that state of affairs will continue. Commercial use of FreeBSD The use of FreeBSD in embedded applications is increasing as well – and it is increasing at the same rate that hardware power is. These days, even inexpensive systems are able to run a BSD kernel. The BSD license and the solid TCP/IP stack prove significant enticements to this market as well. (Unlike the GNU Public License, the BSD license does not require that vendors make derivative works open source.) Companies such as USWest and Verio use FreeBSD for a wide variety of different Internet services. Yahoo! and Hotmail are examples of companies that use FreeBSD extensively for more specific purposes. Yahoo!, for example, has many hundreds of FreeBSD boxes, and Hotmail has almost 2000 FreeBSD machines at its data center in the San Francisco Bay area. Hotmail is owned by Microsoft, so the fact that it runs FreeBSD is a secret. Don’t tell anyone… When asked to comment on the increasing commercial interest in BSD, Hubbard said that FreeBSD is learning the Red Hat lesson. “Walnut Creek and others with business interests in FreeBSD have learned a few things from the Red Hat IPO,” he said, “and nobody is just sitting around now, content with business as usual. It’s clearly business as unusual in the open source world today.” Hubbard had also singled out some of BSD’s commercial partners, such as Whistle Communications, for praise in his opening day keynote. These partners play a key role in moving the project forward, he said, by contributing various enhancements and major new systems, such as Netgraph, as well as by contributing paid employee time spent on FreeBSD. Even short FreeBSD-related contacts can yield good results, Hubbard said. An example of this is the new jail() security code introduced in FreeBSD 3.x and 4.0, which was contributed by R & D Associates. A number of ISPs are also now donating the hardware and bandwidth that allows the project to provide more resource mirrors and experimental development sites. See you next year And speaking of corporate sponsors, thanks go to Walnut Creek for sponsoring the conference, and to Yahoo! for covering all the expenses involved in bringing the entire FreeBSD core team to Berkeley. As a fan of FreeBSD, I’m happy to see that the project has finally produced a conference. It was time: many of the 16 core team members had been working together on a regular basis for nearly seven years without actually meeting face to face. It’s been an interesting year for open source projects. I’m looking forward to the next year – and the next BSD conference – to be even better. ##News Roundup OpenBSD Recommends: Disable SMT/Hyperthreading in all Intel BIOSes Two recently disclosed hardware bugs affected Intel cpus: - TLBleed - T1TF (the name "Foreshadow" refers to 1 of 3 aspects of this bug, more aspects are surely on the way) Solving these bugs requires new cpu microcode, a coding workaround, *AND* the disabling of SMT / Hyperthreading. SMT is fundamentally broken because it shares resources between the two cpu instances and those shared resources lack security differentiators. Some of these side channel attacks aren't trivial, but we can expect most of them to eventually work and leak kernel or cross-VM memory in common usage circumstances, even such as javascript directly in a browser. There will be more hardware bugs and artifacts disclosed. Due to the way SMT interacts with speculative execution on Intel cpus, I expect SMT to exacerbate most of the future problems. A few months back, I urged people to disable hyperthreading on all Intel cpus. I need to repeat that: DISABLE HYPERTHREADING ON ALL YOUR INTEL MACHINES IN THE BIOS. Also, update your BIOS firmware, if you can. OpenBSD -current (and therefore 6.4) will not use hyperthreading if it is enabled, and will update the cpu microcode if possible. But what about 6.2 and 6.3? The situation is very complex, continually evolving, and is taking too much manpower away from other tasks. Furthermore, Intel isn't telling us what is coming next, and are doing a terrible job by not publically documenting what operating systems must do to resolve the problems. We are having to do research by reading other operating systems. There is no time left to backport the changes -- we will not be issuing a complete set of errata and syspatches against 6.2 and 6.3 because it is turning into a distraction. Rather than working on every required patch for 6.2/6.3, we will re-focus manpower and make sure 6.4 contains the best solutions possible. So please try take responsibility for your own machines: Disable SMT in the BIOS menu, and upgrade your BIOS if you can. I'm going to spend my money at a more trustworthy vendor in the future. ###Get Morrowind running on OpenBSD in 5 simple steps This article contains brief instructions on how to get one of the greatest Western RPGs of all time, The Elder Scrolls III: Morrowind, running on OpenBSD using the OpenMW open source engine recreation. These instructions were tested on a ThinkPad X1 Carbon Gen 3. The information was adapted from this OpenMW forum thread: https://forum.openmw.org/viewtopic.php?t=3510 Purchase and download the DRM-free version from GOG (also considered the best version due to the high quality PDF guide that it comes with): https://www.gog.com/game/theelderscrollsiiimorrowindgotyedition Install the required packages built from the ports tree as root. openmw is the recreated game engine, and innoextract is how we will get the game data files out of the win32 executable. pkgadd openmw innoextract Move the file from GOG setuptesmorrowindgoty2.0.0.7.exe into its own directory morrowind/ due to innoextract’s default behaviour of extracting into the current directory. Then type: innoextract setuptesmorrowindgoty2.0.0.7.exe Type openmw-wizard and follow the straightforward instructions. Note that you have a pre-existing installation, and select the morrowind/app/Data Files folder that innoextract extracted. Type in openmw-launcher, toggle the settings to your preferences, and then hit play! iXsystems https://twitter.com/allanjude/status/1034647571124367360 ###My First Clang Bug Part of the role of being a packager is compiling lots (and lots) of packages. That means compiling lots of code from interesting places and in a variety of styles. In my opinion, being a good packager also means providing feedback to upstream when things are bad. That means filing upstream bugs when possible, and upstreaming patches. One of the “exciting” moments in packaging is when tools change. So each and every major CMake update is an exercise in recompiling 2400 or more packages and adjusting bits and pieces. When a software project was last released in 2013, adjusting it to modern tools can become quite a chore (e.g. Squid Report Generator). CMake is excellent for maintaining backwards compatibility, generally accommodating old software with new policies. The most recent 3.12 release candidate had three issues filed from the FreeBSD side, all from fallout with older software. I consider the hours put into good bug reports, part of being a good citizen of the Free Software world. My most interesting bug this week, though, came from one line of code somewhere in Kleopatra: QUNUSED(gpgagentdata); That one line triggered a really peculiar link error in KDE’s FreeBSD CI system. Yup … telling the compiler something is unused made it fall over. Commenting out that line got rid of the link error, but introduced a warning about an unused function. Working with KDE-PIM’s Volker Krause, we whittled the problem down to a six-line example program — two lines if you don’t care much for coding style. I’m glad, at that point, that I could throw it over the hedge to the LLVM team with some explanatory text. Watching the process on their side reminds me ever-so-strongly of how things work in KDE (or FreeBSD for that matter): Bugzilla, Phabricator, and git combine to be an effective workflow for developers (perhaps less so for end-users). Today I got a note saying that the issue had been resolved. So brief a time for a bug. Live fast. Get squashed young. ###DragonFlyBSD Now Runs On The Threadripper 2990WX, Developer Shocked At Performance Last week I carried out some tests of BSD vs. Linux on the new 32-core / 64-thread Threadripper 2990WX. I tested FreeBSD 11, FreeBSD 12, and TrueOS – those benchmarks will be published in the next few days. I tried DragonFlyBSD, but at the time it wouldn’t boot with this AMD HEDT processor. But now the latest DragonFlyBSD development kernel can handle the 2990WX and the lead DragonFly developer calls this new processor “a real beast” and is stunned by its performance potential. When I tried last week, the DragonFlyBSD 5.2.2 stable release nor DragonFlyBSD 5.3 daily snapshot would boot on the 2990WX. But it turns out Matthew Dillon, the lead developer of DragonFlyBSD, picked up a rig and has it running now. So in time for the next 5.4 stable release or those using the daily snapshots can have this 32-core / 64-thread Zen+ CPU running on this operating system long ago forked from FreeBSD. In announcing his success in bringing up the 2990WX under DragonFlyBSD, which required a few minor changes, he shared his performance thoughts and hopes for the rig. “The cpu is a real beast, packing 32 cores and 64 threads. It blows away our dual-core Xeon to the tune of being +50% faster in concurrent compile tests, and it also blows away our older 4-socket Opteron (which we call ‘Monster’) by about the same margin. It’s an impressive CPU. For now the new beast is going to be used to help us improve I/O performance through the filesystem, further SMP work (but DFly scales pretty well to 64 threads already), and perhaps some driver to work to support the 10gbe on the mobo.” Dillon shared some results on the system as well. " The Threadripper 2990WX is a beast. It is at least 50% faster than both the quad socket opteron and the dual socket Xeon system I tested against. The primary limitation for the 2990WX is likely its 4 channels of DDR4 memory, and like all Zen and Zen+ CPUs, memory performance matters more than CPU frequency (and costs almost no power to pump up the performance). That said, it still blow away a dual-socket Xeon with 3x the number of memory channels. That is impressive!" The well known BSD developer also added, “This puts the 2990WX at par efficiency vs a dual-socket Xeon system, and better than the dual-socket Xeon with slower memory and a power cap. This is VERY impressive. I should note that the 2990WX is more specialized with its asymetric NUMA architecture and 32 cores. I think the sweet spot in terms of CPU pricing and efficiency is likely going to be with the 2950X (16-cores/32-threads). It is clear that the 2990WX (32-cores/64-threads) will max out 4-channel memory bandwidth for many workloads, making it a more specialized part. But still awesome…This thing is an incredible beast, I’m glad I got it.” While I have the FreeBSD vs. Linux benchmarks from a few days ago, it looks like now on my ever growing TODO list will be re-trying out the newest DragonFlyBSD daily snapshot for seeing how the performance compares in the mix. Stay tuned for the numbers that should be in the next day or two. ##Beastie Bits X11 on really small devices mandoc-1.14.4 released The pfSense Book is now available to everyone MWL: Burn it down! Burn it all down! Configuring OpenBSD: System and user config files for a more pleasant laptop FreeBSD Security Advisory: Resource exhaustion in TCP reassembly OpenBSD Foundation gets first 2018 Iridium donation New ZFS commit solves issue a few users reported in the feedback segment Project Trident should have a beta release by the end of next week Reminder about Stockholm BUG: September 5, 17:30-22:00 BSD-PL User Group: September 13, 18:30-21:00 Tarsnap ##Feedback/Questions Malcom - Having different routes per interface Bostjan - ZFS and integrity of data Michael - Suggestion for Monitoring Barry - Feedback Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv

Paul's Security Weekly
Renew Our Vows - Enterprise Security Weekly #94

Paul's Security Weekly

Play Episode Listen Later Jun 7, 2018 79:31


This week, on a Special Edition of Enterprise Security Weekly, Paul and John welcome Adrian Sanabria, Director of Research for Savage Security; Dave Kennedy, Founder of TrustedSec, Binary Defense, and DerbyCon; and Security Weekly's very own Jeff Man, for a group discussion on Penetration Testing! In the Enterprise News, we have updates from Qualys, Twistlock, Fortinet, Tenable, and more on this episode of Enterprise Security Weekly!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode94   Visit https://www.securityweekly.com/esw for all the latest episodes!   →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly

Enterprise Security Weekly (Audio)
Renew Our Vows - Enterprise Security Weekly #94

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jun 7, 2018 79:31


This week, on a Special Edition of Enterprise Security Weekly, Paul and John welcome Adrian Sanabria, Director of Research for Savage Security; Dave Kennedy, Founder of TrustedSec, Binary Defense, and DerbyCon; and Security Weekly's very own Jeff Man, for a group discussion on Penetration Testing! In the Enterprise News, we have updates from Qualys, Twistlock, Fortinet, Tenable, and more on this episode of Enterprise Security Weekly!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode94   Visit https://www.securityweekly.com/esw for all the latest episodes!   →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly

Enterprise Security Weekly (Video)
Group Discussion: Penetration Testing - Enterprise Security Weekly #94

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 7, 2018 56:04


Paul and John welcome Adrian Sanabria, Director of Research for Savage Security; Dave Kennedy, Founder of TrustedSec, Binary Defense, and DerbyCon; and Security Weekly's very own Jeff Man! Paul and John have a group discussion with Adrian, Jeff, and Dave on Penetration Testing! Full Show Notes: https://wiki.securityweekly.com/ES_Episode94 Visit http://securityweekly.com/esw for all the latest episodes!

Paul's Security Weekly TV
Group Discussion: Penetration Testing - Enterprise Security Weekly #94

Paul's Security Weekly TV

Play Episode Listen Later Jun 7, 2018 56:04


Paul and John welcome Adrian Sanabria, Director of Research for Savage Security; Dave Kennedy, Founder of TrustedSec, Binary Defense, and DerbyCon; and Security Weekly's very own Jeff Man! Paul and John have a group discussion with Adrian, Jeff, and Dave on Penetration Testing! Full Show Notes: https://wiki.securityweekly.com/ES_Episode94 Visit http://securityweekly.com/esw for all the latest episodes!

Iron Sysadmin Podcast
Episode 30 – We chat security/ops with Dave Kennedy!

Iron Sysadmin Podcast

Play Episode Listen Later Dec 11, 2017 93:09


http://s3.amazonaws.com/ironsysadmin/episodes/IronSysadmin-EP30.ogg Welcome to Episode 30! News https://hackernoon.com/10-things-infosec-professionals-need-to-know-about-networking-d159946efc93 Announcements Chat Main topic Mr. Dave Kennedy! Who is this guy? Entrepeneur TrustedSec – https://www.trustedsec.com/ Binary Defense – https://www.binarydefense.com/ One chip challenge? derbycon! Why is he on our podcast? Pure luck When there‘s no clear division of sec and ops How does the sysadmin skillset apply to infosec? How might that help a sysadmin who want‘s to transition into Infosec? What should new sysadmins learn to be more secure? – Jason https://www.trustedsec.com/team-members/paul-koblitz/ (Roll over the photos) https://www.amazon.com/Time-Based-Security-Winn-Schwartau/dp/0962870048 sysmon? – Linux alternative is auditd : apt-get install auditd / yum install auditd auditctl -a task,always ausearch -i -sc execve Where can you find us? https://www.ironsysadmin.com https://www.patreon.com/ironsysadmin https://www.facebook.com/ironsysadmin https://www.ironsysadmin.com/youtube Tweets by ironsysadmin https://www.ironsysadmin.com/slack Apple Podcasts Stitcher! Google Play Podcasts Intro and Outro music credit: Tri Tachyon, Digital MK 2 http://freemusicarchive.org/music/Tri-Tachyon/