POPULARITY
In this episode, our Cisco Champions dive into the rapidly evolving world of artificial intelligence (AI). From transforming industries to enhancing everyday experiences, AI is reshaping how we live and work. Join us as we discuss the current trends, breakthroughs, and potential challenges that come with integrating AI into various sectors, including IT, healthcare, finance, and beyond. Whether you're curious about how AI impacts business innovation or what it means for personal data privacy and security, this episode will provide valuable insights on the future of technology in a world powered by AI. Cisco Champion hosts Micheline Murphy, Consulting Systems Engineer, WWT Girard Kavelines, Network/Security Engineer, Aqueduct Technologies, Inc. David Macias, Independent Consultant Moderator Danielle Carter, Customer Voices and Cisco Champion Program, Cisco
With the growing number of distributed sites and increasing bandwidth requirements, networking teams must rethink their network operations and network security strategy. Cisco Catalyst 9300-M switches are the ideal solution for modern network needs: deliver secure networks at scale with the powerful Catalyst 9300 hardware and the intuitive Meraki cloud-managed dashboard. Tune in as we discuss the latest addition to the Catalyst 9300-M switching family to help our customers solve the most challenging IT needs with identity-based security, 90W UPOE+, and more. Resources https://meraki.cisco.com/products/switches/models/ Cisco Guests: Nico Darrow, Sr. Technical Marketing Engineer, Cisco Meraki Alex Burger, Principal Technical Marketing Engineer Cisco Champion Hosts Len Ledford (https://www.linkedin.com/in/len-ledford-b5956635/) Technical Solutions Architect, Cerium Networks Ryan Harris (https://www.linkedin.com/in/ryan-harris-thisbridgeistheroot/) Sr. Network Engineer, NetCraftsmen Girard Kavelines (https://www.linkedin.com/in/girard-kavelines-b022a5100/) Network/Security Engineer, Aqueduct Technologies, Inc. Moderator Danielle, Customer Voices and Cisco Champion Program
In this video, we'll be taking a closer look at the day in the life of a network security engineer. Network security is an essential part of modern-day businesses and organizations, and network security engineers are responsible for ensuring the confidentiality, integrity, and availability of critical information and systems. From monitoring security alerts and incidents to performing vulnerability assessments and implementing security controls, network security engineers play a crucial role in protecting sensitive data and preventing cyberattacks.https://www.linkedin.com/in/luisfgarciajr/Support the show
Guest: Michael Farnum, CTO at SET Solutions [@setsolutionsinc]On LinkedIn | https://www.linkedin.com/in/mfarnum/On Twitter | https://twitter.com/m1a1vetHost: Phillip WylieOn ITSPmagazine
Guest: Michael Farnum, CTO at SET Solutions [@setsolutionsinc]On LinkedIn | https://www.linkedin.com/in/mfarnum/On Twitter | https://twitter.com/m1a1vetHost: Phillip WylieOn ITSPmagazine
Ever wonder what it would be like to be a Network and Security Engineer? Well, we have a special guest in today's video that gives us an inside peek at what it would be like running a startup Network and Security Engineering company. If you have any questions feel free to drop them in the comments below and we try to get back to everyone!Link to Interview on Youtube: https://youtu.be/6EC1D3pv85IThe Code of Entry PodcastThe Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the...Listen on: Apple Podcasts SpotifySupport the show
Property Revival Specialists founder, Bhaskar Pandey joins The Al Nicoletti Show this week. Bhaskar left his 15-year career as a Network Security Engineer to follow his true passion for real estate investing. He was able to scale his business quickly with the help of automation and other systems. On this episode, he'll share about automation tools, his involvement with The School of Sharks, and upcoming projects.
Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even worked at the computer lab in college, but never set his sights on that for a career. A conversation with a stranger guided him in that direction and he's been there ever since. As co-host of the CyberWire's Hacking Humans, Joe sees some heartbreaking results of scams and feels education of the public will help to prevent these. Joe reminds us to build our networks as they include people we can always go back to either when searching for a position or looking to fill one on our teams. We thank Joe for sharing his story with us.
Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even worked at the computer lab in college, but never set his sights on that for a career. A conversation with a stranger guided him in that direction and he's been there ever since. As co-host of the CyberWire's Hacking Humans, Joe sees some heartbreaking results of scams and feels education of the public will help to prevent these. Joe reminds us to build our networks as they include people we can always go back to either when searching for a position or looking to fill one on our teams. We thank Joe for sharing his story with us.
In this segment of Paul's Security Weekly, Paul and crew interview Jack Rhysider about how he got his start in Information Security, the projects and careers he worked on over the years, and how he transitioned from a Network Security Engineer to the host of Darknet Diaries Podcast. Segment Resources: https://darknetdiaries.com/ Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw702
In this segment of Paul's Security Weekly, Paul and crew interview Jack Rhysider about how he got his start in Information Security, the projects and careers he worked on over the years, and how he transitioned from a Network Security Engineer to the host of Darknet Diaries Podcast. Segment Resources: https://darknetdiaries.com/ Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw702
This week, we kick off the show with an interview featuring Scott Scheferman, Principal Strategist at Eclypsium, to talk about The BIOS Disconnect and vulnerabilities affecting the BIOSConnect feature within the Dell Client BIOS! Next up, we welcome Jack Rhysider, Podcaster and Host of the Darknet Diaries Podcast, to discuss the The Journey from a Network Security Engineer to a Podcast Host! In the Security News, the White House Announces a Ransomware Task Force, how much money Microsoft has paid out to security researchers last year, Amazon rolls out encryption for Ring doorbells, how a backdoor in popular KiwiSDR product gave root to a project developer for years, Trickbot Malware Returns with a new VNC Module to Spy on its Victims, and some of the absolute funniest quotes about cyber security & tech in 2021! Show Notes: https://securityweekly.com/psw702 Segment Resources: https://eclypsium.com/2021/06/24/biosdisconnect/ Visit https://securityweekly.com/eclypsium to learn more about them! https://darknetdiaries.com/ Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we kick off the show with an interview featuring Scott Scheferman, Principal Strategist at Eclypsium, to talk about The BIOS Disconnect and vulnerabilities affecting the BIOSConnect feature within the Dell Client BIOS! Next up, we welcome Jack Rhysider, Podcaster and Host of the Darknet Diaries Podcast, to discuss the The Journey from a Network Security Engineer to a Podcast Host! In the Security News, the White House Announces a Ransomware Task Force, how much money Microsoft has paid out to security researchers last year, Amazon rolls out encryption for Ring doorbells, how a backdoor in popular KiwiSDR product gave root to a project developer for years, Trickbot Malware Returns with a new VNC Module to Spy on its Victims, and some of the absolute funniest quotes about cyber security & tech in 2021! Show Notes: https://securityweekly.com/psw702 Segment Resources: https://eclypsium.com/2021/06/24/biosdisconnect/ Visit https://securityweekly.com/eclypsium to learn more about them! https://darknetdiaries.com/ Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
In this episode of The Hoot, we talk with David Graff, Network Security Engineer at Michigan State University about pain points experienced with their existing solution, why they switched to Humio, and the need to log everything at scale. David shares MSUs strategy on how to set up needed hardware for maximum efficiency to optimize costs, as well as address the silicon chip shortage many IT departments are dealing with today. Similar to other universities and public sector agencies, David shares MSU's challenges around needing to scale while also being very cost conscious. They use Humio for threat detection and being able to log everything is critical to keeping their network and systems secure.
Erin danced professionally for Colorado Ballet and Arts Ballet Theatre of Florida. When stress and pressure in the studio overpowered her love of the ballet movement, Erin knew it was time to move on. In college, despite liking English more than math throughout high school, she enjoyed her physics class most. A career-oriented mindset then steered her into electrical and computer engineering. She found work in Silicon Valley where she protects major tech companies from cybersecurity threats. Follow Erin @outdoorsbynature. For any listeners curious about how computer programming can be a great fit for creatives, check out this blog post I wrote in college: https://helix.northwestern.edu/blog/2014/05/storytelling-binary --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/count9/message Support this podcast: https://anchor.fm/count9/support
This week, host Chris Fenwick is joined by Nash co-founder Thomas Saunders and one of our backend engineers, Jan Huwald, who are part of the Settlement and Funds team. They discuss Nash Pay and other protocols, state channels and a solution Nash decided not to move forward with.
This video was sponsored by Cisco. Learn more about network programmability with Intent-Based Networking: http://cs.co/6001DvutX Check out the Cisco DNA Center: http://cs.co/6000DvuQo Are you interested in becoming a Network Security Engineer? Information Security Engineer? Cyber Security Engineer? Or are you currently in this role? Things are CHANGING!!! We've been hearing about this whole "Network Programmability" thing for a while now but it seemed to only be about the Route and Switch guys. But I'm here to tell you that automation and programmability is alive and kicking in the Information Security field!! In this video I talk about this amazing demo I saw at CiscoLive that utilized Cisco DNA Center and Cisco Stealthwatch to AUTOMATE SECURITY!! What does this mean for you? Well, getting your CCNA Security, CCNP Security…CCNA CyberOps…is GREAT…but you may want to learn some Python to get ahead of the curve!
Mimi Herrmann is a Network Security Engineer based in the Washington, D.C. area. She is also a contributing author and peer reviewer for Taylor and Francis. Mimi has been in security for more than twenty years, possessing experience at companies like McAfee, Tenable, Capstone, and more. Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode511 Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Mimi Herrmann is a Network Security Engineer based in the Washington, D.C. area. She is also a contributing author and peer reviewer for Taylor and Francis. Mimi has been in security for more than twenty years, possessing experience at companies like McAfee, Tenable, Capstone, and more. Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode511 Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jeremy-Dorrough-USB-Attack-to-Decrypt-Wi-Fi-Communications.pdf USB Attack to Decrypt Wi-Fi Communications Jeremy Dorrough Senior Network Security Architect / Genworth Financial The term “Bad USB” has gotten some much needed press in last few months. There have been talks that have identified the risks that are caused by the inherent trust between the OS and any device attached by USB. I found in my research that most of the available payloads for the USB rubber ducky would be stopped by common enterprise security solutions. I then set out to create a new exploit that would force the victim to trust my Man-In-The-Middle access point. After my payload is deployed, all Wi-Fi communications will be readable, including usernames, passwords and authentication cookies. The attack will work without the need of elevating privileges, which makes it ideal for corporate environments. Jeremy has built his career around protecting assets in the most critical IT sectors. He started his career working in a Network Operations Security Center for the US Army. He then went on to work as a Network Security Engineer defending Dominion’s North Anna Nuclear Power Station. He is currently a Senior Network Security Engineer/Architect at Genworth Financial. He is a MBA, CISSP, CEH, GIAC GPPA, CSA CCSK, ABCDEFG… Blah Blah Blah. Jeremy has spent over 10 years researching and implementing new ways to defend against the latest attacks. He enjoys creating new exploits and feels it makes him a more well-rounded defensive Security Engineer. He is happily married and a father to two soon to be hackers. When he’s not staring at a command prompt, he is busy building and driving demolition derby cars. Twitter: @jdorrough1
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Panel-Comedy-Inception-Amanda-Berlin-Blue-Team-Hell.pdf DEF CON Comedy Inception: How many levels deep can we go? Larry Pesce Senior Security Analyst, InGuardians Chris Sistrunk Mandiant/FireEye Will "illwill" Genovese Chris Blow Rook Security Dan Tentler Carbon Dynamics Amanda Berlin Hurricane Labs This year at DEF CON a former FAIL PANEL panelist attempts to keep the spirit alive by playing moderator. Less poetry, more roasting. A new cast of characters, more lulz, and no rules. Nothing is sacred, not the industry, not the audience, not even each other. Our cast of characters will bring you all sorts of technical fail, ROFLCOPTER to back it up. No waffles, but we have other tricks up our sleeve to punish, er, um, show love to our audience, all while raising money of the EFF and HFC. The FAIL PANEL may be dead, but the “giving” goes on. Larry Pesce is a Senior Security Analyst with InGuardians. His recent experience includes providing penetration assessment, architecture review, hardware security assessment, wireless/radio analysis, and policy and procedure development for a wide range of industries including those in the financial, retail, and healthcare verticals. Larry is an accomplished speaker, having presented numerous times at industry conferences as well as the co-host of the long running multi-award winning Security Podcast, Paul's Security Weekly. and is a certified instructor with the SANS Institute. Larry is a graduate of Roger Williams University. In his spare time he likes to tinker with all things electronic and wireless. Larry is an amateur radio operator holding his Extra class license and is regularly involved in emergency communications activities. In 1972 a crack commando unit was sent to prison by a military court for a crime they didn't commit. These men promptly escaped from a maximum security stockade.... making the decision to leave Amanda behind. Ms. Berlin is now rumored to have illegitimate children by Saudi Oil barons hidden all over the world in at least 27 countries but this can neither be confirmed nor denied. Amanda Berlin is a Network Security Engineer at Hurricane Labs. She is most well known for being a breaker of hearts, knees, and SJW's. Bringing "Jack of All Trades" back to being sexy, she has worked her fingers to the bone securing ISPs, Healthcare facilities, Artificial Insemination factories, and brothels. Amanda managed the internal phishing campaign at a medium size healthcare facility to promote user education about phishing and hacking through an awards based reporting program. She is a lead organizer for CircleCityCon, volunteers at many other conferences, and enjoys writing and teaching others. Twitter: @InfoSystir Chris Blow is a Senior Technical Advisor with Rook Security. His most recent experience includes: penetration testing, social engineering, red team exercises, policy and procedure guidance focused on HIPAA and PCI DSS, developing security awareness programs, performing HIPAA assessments and serving as a Qualified Security Assessor for the Payment Card Industry. @b10w In reality, his primary duties are to be told by various clients that “security is hard” and to just “accept the risk.” He’s also well-versed in being told to keep vulnerable assets and people “out of scope.” Chris is a graduate of Purdue University in West Lafayette, IN. Besides trying to keep up with all-things-InfoSec, Chris enjoys playing guitar, singing, and DJing. Twitter: @b10w illwill is a rogue blackhat as fuck subcontractor for top secret global governments. He spends his off time enjoying bubble baths, recovering from a debilitating injury as infosystir's former bean fluffer and hand carves realistic thrones made from discarded dildos found dumpster diving behind a porn store in Los Angeles. Dan Tentler likes to break things. He's also an expert on failure. Ask him about it. But ask with scotch. Twitter: @viss @chrissistrunk