Podcast appearances and mentions of rob fuller

  • 34PODCASTS
  • 47EPISODES
  • 47mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 29, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about rob fuller

Latest podcast episodes about rob fuller

Talks and Lectures
Day in the Life of...A Yeoman Warder

Talks and Lectures

Play Episode Listen Later Feb 29, 2024 24:15


The Yeoman Warders have guarded the Tower of London for 500 years, and is perhaps the oldest of jobs that still exists in our palaces today. In this final episode of a Day in the Life, we meet the Chief Yeoman Warder himself, Rob Fuller, and Curator Charles Farris fills us in on the storied history of this role.  To find out more about the forgotten stories of those who worked at the royal palaces over 300 years ago, a new exhibition is opening at Kensington Palace.  https://www.hrp.org.uk/kensington-palace/whats-on/untold-lives/     

RNZ: Nights
Beefeaters get a new boss

RNZ: Nights

Play Episode Listen Later Jul 27, 2023 14:22


Nights is off to London tonight - The Tower of London to be exact. Rob Fuller is the New Chief Yeoman Warder at The Tower of London, and he joins us Nights to talk about his role as a Yeoman - or a "beefeater" as they're more commonly known.

tower nights new boss yeoman beefeaters rob fuller
Paul's Security Weekly (Video-Only)
Pen Testing Techniques and Jurassic Malware - Rob Fuller - PSW #783

Paul's Security Weekly (Video-Only)

Play Episode Listen Later May 4, 2023 59:38


Rob "Mubix" Fuller comes on the show to talk about penetration testing, what's changed over the years? He'll also discuss "Jurassic Malware" and creating games in your BIOS.   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw783 

Paul's Security Weekly
PSW #783 - Rob Fuller

Paul's Security Weekly

Play Episode Listen Later May 4, 2023 167:12


Rob "Mubix" Fuller comes on the show to talk about penetration testing, what's changed over the years? He'll also discuss "Jurassic Malware" and creating games in your BIOS.   This week in the Security News: 5-year old vulnerabilities, hijacking packages, EV charging apps that could steal stuff, do we even need software packages, selling hacking tools and ethics, I hate it when vendors fix stuff, HTTPS lock status, no pornhub for you!    Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/psw783 

ev bios security news rob fuller ai hunter
Paul's Security Weekly TV
Pen Testing Techniques and Jurassic Malware - Rob Fuller - PSW #783

Paul's Security Weekly TV

Play Episode Listen Later May 4, 2023 59:38


Rob "Mubix" Fuller comes on the show to talk about penetration testing, what's changed over the years? He'll also discuss "Jurassic Malware" and creating games in your BIOS.   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw783 

Paul's Security Weekly (Podcast-Only)
PSW #783 - Rob Fuller

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later May 4, 2023 167:12


Rob "Mubix" Fuller comes on the show to talk about penetration testing, what's changed over the years? He'll also discuss "Jurassic Malware" and creating games in your BIOS.   This week in the Security News: 5-year old vulnerabilities, hijacking packages, EV charging apps that could steal stuff, do we even need software packages, selling hacking tools and ethics, I hate it when vendors fix stuff, HTTPS lock status, no pornhub for you!    Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/psw783 

ev bios security news rob fuller ai hunter
Lifesciences Professional
How Hiring Fractional Executives Prepare Healthcare Companies For Success

Lifesciences Professional

Play Episode Listen Later Feb 15, 2023 44:22


Rob Fuller, Managing Director and Co-Founder of Sterasure and David Whiteside, Fractional Executive responsible for business development of BIHOCL (pronounced "bio sel") PureCleanse Antimicrobial Solution, speak with Linda about leveraging experienced fractional executives to bring products to the Canadian healthcare marketplace.   Meet Rob, The Managing Director of Sterasure, a Canadian Medical device startup based in Kitchener/Waterloo, ON. Rob and his co-founder Bill launched Sterasure to improve patient outcomes through SSI prevention and technological innovations to tackle anti-microbial resistance across healthcare institutions globally. Rob has been involved in starting & building businesses in both healthcare and non-healthcare fields and recently exited another company he ran in the medical laser industry to focus his attention on tackling these urgent & pressing issues. Rob brings an eagerness and drive for solving complex problems, particularly in the medical device and biotechnology sector.  Sterasure has recently launched BIHOCL PureCleanse, a new innovative antimicrobial skin and wound solution.  To learn more, please go to www.bihocl.com David Whiteside is a seasoned professional with over 20 years of experience in the medical device industry. As a sales and marketing leader, he deeply understands market access, key account management, and GPO operations. Throughout his career, David has worked with a range of companies, starting with large multinationals such as Johnson & Johnson, Medela, and Hollister, and now specializes in helping smaller Canadian health science companies grow their revenue in Canada, the U.S.A and Europe. With his expertise and entrepreneurial spirit, David has a proven track record of success in driving revenue and growth for his clients. His passion for the industry and his experience and leadership skills make him a valuable ‘fractional' asset to any team.

NeedleStack
The Best of Season 1

NeedleStack

Play Episode Listen Later Jan 24, 2023 40:32


Watch when Jack Rhysider of Darknet Diaries shares his amazement at what hackers will do “for a free burrito,” or the moment Rob Fuller, a read team and CTI director, condemns security awareness training. From journalists to OSINT investigators to dark web experts, here are some of the best moments we shared with guests last season.

The RH-ISAC Podcast
Bug Bounty Programs: The Good, the Bad, and How To Get Started

The RH-ISAC Podcast

Play Episode Listen Later Nov 30, 2022 30:26


In this episode of the RH-ISAC podcast, RH-ISAC member, Rob Fuller, shares his first-hand experience with vulnerability disclosure, or bug bounty programs, the benefits, the challenges, and some tips for getting your program off the ground.  Thank you to Fortinet for their sponsorship of the RH-ISAC podcast. 

The Shared Security Show
How to Break Into a Cybersecurity Career – Rob Fuller (Mubix)

The Shared Security Show

Play Episode Listen Later Nov 28, 2022 27:53


This week we continue our series on how to break into a cybersecurity career with long time industry veteran, Rob Fuller (Mubix). Rob speaks with us about how he started his career in the Marine Corps, his time on Hak5, and more recently earning his Masters degree. Rob also talks about how these experiences has […] The post How to Break Into a Cybersecurity Career – Rob Fuller (Mubix) appeared first on The Shared Security Show.

Uncontested Investing
Operating A Real Estate Business With Rob Fuller

Uncontested Investing

Play Episode Listen Later Nov 22, 2022 32:08


Are you one of those that have a real estate dream they want to realize but just don't know how? Then this podcast is for you! Join us as Rob Fuller, a real estate developer, investor, and visionary, shares his journey on getting into the business of buying and selling homes and gives exclusive takeaways on operating a real estate business! Love the show? Subscribe, rate, review, and share! REI INK – Magazine (rei-ink.com)

NeedleStack
Red team, blue team, stopping hack fiends

NeedleStack

Play Episode Listen Later Jul 12, 2022 35:28 Transcription Available


In episode 20 we interview Rob Fuller, the red team and CTI director for a major U.S. airline. Rob discusses how red teams can better leverage CTI, the grand mistakes of even the most security-conscious individuals, and why he thinks most security awareness training gets it wrong.

hack stopping fiends cti rob fuller red team blue team
Bald Faced Truth with John Canzano
BFT Interview: Rob Fuller

Bald Faced Truth with John Canzano

Play Episode Listen Later Feb 4, 2022 17:55


John Canzano talks with Rob Fuller from the Portland Football Officials Association. Fuller discusses what makes a good ref, the massive impact the pandemic had on refs in Oregon, getting refs ready for game action, how to put the best high school product out and much more! Subscribe NOW to this podcast for more great content. Follow @JohnCanzanoBFT on Twitter

Bald Faced Truth with John Canzano
BFT Show: Rob Fuller, Michael Lewellyn

Bald Faced Truth with John Canzano

Play Episode Listen Later Feb 4, 2022 137:37


On Friday's Bald Faced Truth, John Canzano is joined by two great guests. In the opening hour Rob Fuller from the Portland Football Officials Association joins to discuss the state of refereeing for High School sports in Oregon and the need for plenty more refs. For two segments in the second hour, University of Portland Vice President Michael Lewellyn joins John to talk about his time working as an executive for the Blazers, the Rooney rule and much more. We also talk about the Blazers trade off of Norman Powell, Kelly Graves, play punch-it audio and so much more! Subscribe NOW to this podcast for more great content. Follow @JohnCanzanoBFT on Twitter.

DOUBLE AXE HANDLE SMASH
Double Axe Handle Smash Podcast - Episode 13: Col. Rob Parker

DOUBLE AXE HANDLE SMASH

Play Episode Listen Later Nov 2, 2021 99:19


Whether you remember him as Col. Rob parker (WCW), or Tennessee Lee (WWF), Rob Fuller has a storied career that spans over two decades. From pro wrestler, to being one of the best managers of the 1990s, he shares his story with Johnny O . and Metal Ed on this installment of the Double Axe Handle Smash Podcast!Brought to you by: Gio's Pizzeria and lounge (www.giospizzeria.com)andwww.rubhouse.comWant to start your own podcast? Paste this link in your web browser:https://www.buzzsprout.com/?referrer_id=1773218

Ray and Joe D.
Ray and Brian w Dr. Rob Fuller 10/11/21

Ray and Joe D.

Play Episode Listen Later Oct 11, 2021 6:55


Dr. Rob Fuller, Chair of emergency medicine, UConn Health. Back after spending three weeks in Haiti running a medical clinic and preparing local providers to sustain it. See omnystudio.com/listener for privacy information.

H4unt3d Hacker
H4unt3d Hacker #44 Rob Fuller "Mubix"

H4unt3d Hacker

Play Episode Listen Later Aug 29, 2021 90:06


"Mubix" joins the ghosts in the h4unt3d house and talks about his career, marines, uber, hak5, HBO's "silicone valley" and much more! Thanks Rob!

hbo hackers rob fuller mubix
IREM: From the Front Lines
Managing Data Centers

IREM: From the Front Lines

Play Episode Listen Later Jun 8, 2021 9:27


Rob Fuller, CPM® Sr. Facilities Manager at CBRE shares special considerations in infrastructure, systems, and staffing necessary when managing data centers. 

Bloomberg Law
Can Employers Segregate Unvaccinated Workers?

Bloomberg Law

Play Episode Listen Later May 25, 2021 28:42


Healthcare attorney Rob Fuller, a partner at Nelson Hardiman, discusses recent CDC guidance on masks and what it means for businesses. Paige Smith, Bloomberg Law Reporter for labor and employment, discusses employers separating vaccinated and unvaccinated workers, for example, by shift or floor. June Grasso hosts.

Bloomberg Law
Can Employers Segregate Unvaccinated Workers?

Bloomberg Law

Play Episode Listen Later May 25, 2021 28:42


Healthcare attorney Rob Fuller, a partner at Nelson Hardiman, discusses recent CDC guidance on masks and what it means for businesses. Paige Smith, Bloomberg Law Reporter for labor and employment, discusses employers separating vaccinated and unvaccinated workers, for example, by shift or floor. June Grasso hosts. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com

Bring a Trailer Podcast
Nissan/Datsun Expert Rob Fuller of Z Car Garage

Bring a Trailer Podcast

Play Episode Listen Later May 21, 2021 41:27


Rob Fuller of Z Car Garage chats with Randy and Howard about the Nissan/Datsun market.

Get Rich Education
343: Housing Shortage Crisis Deepens - Case Study With A Developer

Get Rich Education

Play Episode Listen Later May 3, 2021 43:56


Today, available homes are as scarce as a rare earth mineral.  Under 500K homes are available for sale today, well below the historic 1M-1.5M at any given time Source: Federal Reserve. High demand exists independent of low inventory. Developers and homebuilders need years to help us build our way out. The development team of Rob Fuller and Jared Garfield tell us how today’s developers cope with the rising cost and unpredictable supply of: copper, lumber, PVC and other building materials. Their project in Colorado Springs, CO is in the path of progress. In 2019, U.S. News & World Report named the area the #1 Economy In America. The Denver Post stated that by 2050, Colorado Springs will be larger than Denver. (Wow) The project is 800 acres of higher-end homes on 2.5-acre lots. Homes start in the high $600Ks. That does not work for cash flow via direct ownership. This is not “spec building”. Homeowners have already funded with non-refundable earnest money. You can project a construction loan to the project yourself. Cash-on-cash returns are 9% to 15%, depending on the investment amount. $100K minimum. Learn more about this project at www.GetRichEducation.com/ColoradoSprings.  Investors have substantial guarantees and financial buffers.  This is an A+ real estate asset class. You can view weekly project drone footage. On-site visits are available. I might attend one where you could meet me in-person in Colorado Springs. Resources mentioned: Private Lending in the Path Of Progress: GetRichEducation.com/ColoradoSprings U.S. Active Home Listing Count: https://fred.stlouisfed.org/series/ACTLISCOUUS Show Notes: www.GetRichEducation.com/343 Get mortgage loans for investment property: RidgeLendingGroup.com New Construction Turnkey Property: CashFlowAndGrowth.com Ali Boone’s Recommended Book: https://amzn.to/2NsMVlF EQRPs: text “EQRP” in ALL CAPS to 72000 or: eQRP.co By texting “EQRP” to 72000 and opting in, you will receive periodic marketing messages from eQRP Co. Message & data rates may apply. Reply “STOP” to cancel. Best Financial Education: GetRichEducation.com Get our free, wealth-building “Don’t Quit Your Daydream Letter”: www.GetRichEducation.com/Letter Top Properties & Providers: GREturnkey.com Follow us on Instagram: @getricheducation Keith’s personal Instagram: @keithweinhold

The Social-Engineer Podcast
Ep. 142 – You Can Be Right And Still Be Wrong With Brian Phillips

The Social-Engineer Podcast

Play Episode Listen Later Mar 15, 2021 47:03


In this episode of the SECurity Awareness Series of the SEPodcast, Chris Hadnagy and Ryan MacDougall are joined by Brian Phillips who is responsible for information security at Macy’s. Listen as they discuss how to: build an information security organization, hire the right people, and get buy-in from executives.  March 15, 2021   00:09 – Intro  Social-Engineer.com  Phishing As A Service®  Vishing As A Service®  01:54 – Introduction to Brian Phillips  02:44 – Security in a retail environment and impacts from the pandemic  07:25 - How to build an information security organization from the ground up  10:14 – Changing an organization's mindset for better security  14:20 – The most desirable quality in a team member, and how to recognize it in an interview  18:21 – How to nurture an outsider into a security professional  22:48 - How to align corporate security initiatives with business goals  Never Split the Difference: Negotiating As If Your Life Depended On It  26:38 – The importance of buy-in from the C-level down, and how to get it.  38:13 – Key takeaways that corporations should start doing now  40:17 – Brian’s most respected colleagues  Dave Kennedy  Ed Skoudis  John Strand  Rob Fuller  Carlos Perez  42:14 – Brian's book recommendations  Never Split the Difference: Negotiating As If Your Life Depended On It  Thinking, Fast and Slow  Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You  How to Win Friends & Influence People  Robin Dreke's Books:  Sizing People Up: A Veteran FBI Agent's User Manual for Behavior Prediction  It's Not All About Me: The Top Ten Techniques for Building Quick Rapport with Anyone  The Code of Trust: An American Counterintelligence Expert's Five Rules to Lead and Succeed  Joe Navarro’s Books:  Be Exceptional: Master the Five Traits That Set Extraordinary People Apart  The Dictionary of Body Language: A Field Guide to Human Behavior  What Every Body Is Saying: An Ex-FBI Agent's Guide to Speed-Reading People  (more)    Leaders Eat Last: Why Some Teams Pull Together and Others Don't    44:03 – Conclusion  Ryan on Twitter  Brian on Twitter  Chris on Twitter  Social-Engineer.org   Social-Engineer.com  The Innocent Lives Foundation  Clutch 

Hacking into Security - Career Talks
Hacking into Security #27 - US Marine to Red Teaming and Purple Teaming, with @mubix (Rob Fuller)

Hacking into Security - Career Talks

Play Episode Listen Later Oct 3, 2020 50:27


In this episode, we catch up with @mubix (Rob Fuller), a is red teamer turned purple teamer. He started his career in the United States Marine Corps working with explosives and has gone on to have a highly successful career in the security industry working at companies like Rapid7, GE, Uber, Cruise Automation and now Balck Hills Information Security, as well as contributing back in many ways to the security community and speaking at many conferences around the world.Mubix shares his journey, stories along the way, as well as going deeper into both red and purple teaming.

Holy Names Hawks
HawkCast - Rob Fuller and Coach Omar Sanchez

Holy Names Hawks

Play Episode Listen Later Feb 28, 2020 11:58


Drew Gwerder sits down with Senior Point Guard Rob Fuller and Head Men's Basketball Coach Omar Sanchez ahead of their final game of the season on Saturday. They talk about senior day, Rob's journey as a Hawk and what the future may hold for him. Fuller also talks about what he's learned and gives advice to future Hawks.

Brakeing Down Security Podcast
2020-007-Roberto_Rodriguez-threat_hunting-juypter_notebooks_data-science

Brakeing Down Security Podcast

Play Episode Listen Later Feb 25, 2020 63:39


Brakesec Podcast is now on Pandora!  Find us here: https://pandora.app.link/p9AvwdTpT3 Book club Book club is starting up again with Hands-On AWS penetration testing with Kali Linux from Gilbert and Caudill. You read and get together to discuss or demo every Monday. Get the book, start reading and meet us for the kick off Monday the 24 at 10pm eastern. The book club meets virtually on zoom, and organizes on slack..get invited like this.”   Book: https://smile.amazon.com/Hands-Penetration-Testing-Kali-Linux/dp/1789136725   NolaCon Training: https://nolacon.com/training/2020/security-detect-and-defense-ttx Roberto Rodriguez    Bio @Cyb3rWard0g on Twitter Threat Intel vs. Threat Hunting = what’s the difference?   What datasets are you using?    Did you start with any particular dataset, or created your own?   Technique development - what skills are needed?     C2 setup     Detection mechanisms     Honeypots   How can people get involved?   Blacksmith - create ‘mordor’ environment to push scripts to setup honeypot/nets   https://Threathunterplaybook.com    https://github.com/hunters-forge/ThreatHunter-Playbook    https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/lateral_movement/WIN-190815181010.html   https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4   https://medium.com/threat-hunters-forge/writing-an-interactive-book-over-the-threat-hunter-playbook-with-the-help-of-the-jupyter-book-3ff37a3123c7    https://www.exploit-db.com/exploits/47995 - Sudo buffer overflow   Mordor: The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption.    YAML Example: https://github.com/hunters-forge/ThreatHunter-Playbook/blob/master/playbooks/WIN-190810201010.yaml   Notebook Example: https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/lateral_movement/WIN-190810201010.html    Jupyter notebook - Definition: https://jupyter-notebook-beginner-guide.readthedocs.io/en/latest/what_is_jupyter.html    Lateral Movement - WMI - IMAGE Below SIGMA?   What is a Notebook? Think of a notebook as a document that you can access via a web interface that allows you to save input (i.e live code) and output (i.e code execution results / evaluated code output) of interactive sessions as well as important notes needed to explain the methodology and steps taken to perform specific tasks (i.e data analysis). https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4 Have a goal for expanding to other parts of ATT&CK?   Threat Hunter Playbook - Goals Expedite the development of techniques an hypothesis for hunting campaigns. Help Threat Hunters understand patterns of behavior observed during post-exploitation. Reduce the number of false positives while hunting by providing more context around suspicious events. Share real-time analytics validation examples through cloud computing environments for free. Distribute Threat Hunting concepts and processes around the world for free. Map pre-recorded datasets to adversarial techniques. Accelerate infosec learning through open source resources. Sub-techniques:   https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a   Slack Channel:   https://launchpass.com/threathunting   Twitter; https://twitter.com/mattifestation https://twitter.com/tifkin_ https://twitter.com/choldgraf https://twitter.com/Cyb3rPandaH   on Brakeing Down Security Podcast on #Pandora- https://www.pandora.com/podcast/brakeing-down-security-podcast/PC:27866 Marcus Carey https://twitter.com/marcusjcarey  Prolific Author, Defender, Enterprise Architect at ReliaQuest   https://twitter.com/egyp7    https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950   “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.”   Security model - everyone’s is diff     How do you work with your threat model?     A proper threat model   Attack Simulation -      How is this different from doing a typical Incident Response tabletop? Threat modeling systems?     How is this different than a pentest?     Is this automated red teaming? How effective can automated testing be?     Is this like some kind of constant scanning system?     How does this work with threat intel feeds?      Can it simulate ransomware, or any attacks?   Hedgehog principles     A lot of things crappily, and nothing good   Mr. Boettcher: “Why suck at everything…”   Atomic Red Team - https://github.com/redcanaryco/atomic-red-team  ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/    Tribe of Hackers  https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 -  Red Book   The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking.  This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book   Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation   https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit?   https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #Pandora: https://pandora.app.link/p9AvwdTpT3 #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel:  http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site:  https://brakesec.com/bdswebsite #iHeartRadio App:  https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec  

The ACTIVATE U Podcast
Rob Fuller - Spartan Firearms

The ACTIVATE U Podcast

Play Episode Listen Later Feb 11, 2020 23:58


In this episode of the ACTIVATE U Podcast we talk with Rob from Spartan Firearms and we talk about his journey to starting his business. Rob provides a great perspective on how he came from the commercial lending industry and was bale to use that knowledge to adapt to his business. He shares how going through economy and business issues can be stressful but also how you can adapt to them! This is a unique conversation with a great business owner! http://www.spartanfirearms.us/ https://www.facebook.com/pg/SpartanFirearmsMinot/about/?ref=page_internal  

Brakeing Down Security Podcast
2020-005-Marcus J Carey, red team automation, and Tribe of Hackers book series

Brakeing Down Security Podcast

Play Episode Listen Later Feb 9, 2020 43:37


Brakeing Down Security Podcast on #Pandora- https://www.pandora.com/podcast/brakeing-down-security-podcast/PC:27866 Marcus Carey https://twitter.com/marcusjcarey  Prolific Author, Defender, Enterprise Architect at ReliaQuest   https://twitter.com/egyp7    https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950   “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.”   Security model - everyone’s is diff     How do you work with your threat model?     A proper threat model   Attack Simulation -      How is this different from doing a typical Incident Response tabletop? Threat modeling systems?     How is this different than a pentest?     Is this automated red teaming? How effective can automated testing be?     Is this like some kind of constant scanning system?     How does this work with threat intel feeds?      Can it simulate ransomware, or any attacks?   Hedgehog principles     A lot of things crappily, and nothing good   Mr. Boettcher: “Why suck at everything…”   Atomic Red Team - https://github.com/redcanaryco/atomic-red-team  ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/    Tribe of Hackers  https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 -  Red Book   The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking.  This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book   Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation   https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit?   https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel:  http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site:  https://brakesec.com/bdswebsite #iHeartRadio App:  https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec

Brakeing Down Security Podcast
2020-004-Marcus Carey, ShmooCon Report, threat simulation

Brakeing Down Security Podcast

Play Episode Listen Later Feb 5, 2020 31:35


  Marcus Carey https://twitter.com/marcusjcarey  Prolific Author, Defender, Enterprise Architect at ReliaQuest https://twitter.com/egyp7  https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950   “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.”   Security model - everyone’s is diff     How do you work with your threat model?     A proper threat model   Attack Simulation -      How is this different from doing a typical Incident Response tabletop? Threat modeling systems?     How is this different than a pentest?     Is this automated red teaming? How effective can automated testing be?     Is this like some kind of constant scanning system?     How does this work with threat intel feeds?      Can it simulate ransomware, or any attacks?   Hedgehog principles     A lot of things crappily, and nothing good   Mr. Boettcher: “Why suck at everything…”   Atomic Red Team - https://github.com/redcanaryco/atomic-red-team  ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/    Tribe of Hackers  https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 -  Red Book   The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking.  This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book   Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation   https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit?   https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel:  http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site:  https://brakesec.com/bdswebsite #iHeartRadio App:  https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec

Ohana Baptist Church Audio
9/14/2019 - A Lifestyle of Worship

Ohana Baptist Church Audio

Play Episode Listen Later Oct 4, 2019 48:05


Rob Fuller

Sean's Sports Stop
Episode 162

Sean's Sports Stop

Play Episode Listen Later Oct 27, 2018 22:52


On Episode #162 of Sean's Sports Show, Sean reports each and every breaking news story in sports and gives his unique perspective on each one, which include: the boss of FIFA not approving La Liga matches to be played in the USA (3:20), Russel Westbrook saying that we should not panic after the Oklahoma City Thunder start 0-4 (5:00), the Lakers getting their first home win of the season and first win at Staples Center with LeBron James (7:56), Rob Fuller of the Houston Texans tearing his ACL (8:38), the Boston Red Sox accusing Manny Machado of the Los Angeles Dodgers of stealing signs (9:24), the Houston Rockets and Minnesota Timberwolves being at a standstill with a possible Jimmy Butler trade (12:30), Demarcus Cousins getting ejected before he played a second with the Golden State Warriors (14:27), JD Martinez and Christian Yelich winning the Hank Aaron award (17:40), and Kevin Durant going off for 41 points at MSG vs the New York Knicks (17:40). Sean also covers the news, results, and future matchups of the LA Sports Teams (19:00). I AM NOW A SPORTS WRITER FOR www.allteamz.com I will be writing and publishing articles regularly. I have published my first article and here is the link: https://wp.me/p7BkhM-rV EPISODE 162 AND EVERY OTHER EPISODE OF SEAN'S SPORTS SHOW IS AVAILABLE ON EVERY PODCAST PLATFORM (INCLUDES ITUNES AND SPOTIFY). IF YOU ENJOYED THIS EPISODE, FEEL FREE TO LEAVE A 5 STAR REVIEW ON ITUNES AND SUBSCRIBE TO KNOW ABOUT FUTURE EPISODES. IF YOU WOULD LIKE THIS PODCAST TO KEEP GOING, PLEASE DONATE WHATEVER MONEY YOU CAN. I PLEDGE TO USE ANY MONEY THAT YOU DO DONATE FOR THE SOLE PURPOSE OF MAKING THIS PODCAST BETTER! FOLLOW ME ON INSTAGRAM: @sean.tiplitsky @seanssportshow FOLLOW ME ON TWITTER: @seanssportshow ADD ME ON FACEBOOK: Sean's Sports Show --- Send in a voice message: https://anchor.fm/seanssportsstop/message Support this podcast: https://anchor.fm/seanssportsstop/support

Absolute AppSec
Episode 31: Rob Fuller

Absolute AppSec

Play Episode Listen Later Sep 12, 2018


Practical advice on submitting and writing effective findings for bug bounties and reports. Rob Fuller (@mubix) talks about his path into security, CCDC, volunteerism, NoVA Hackers and more.

practical ccdc rob fuller
Absolute AppSec
Episode 31: Rob Fuller

Absolute AppSec

Play Episode Listen Later Sep 11, 2018


Practical advice on submitting and writing effective findings for bug bounties and reports. Rob Fuller (@mubix) talks about his path into security, CCDC, volunteerism, NoVA Hackers and more.

practical ccdc rob fuller
Between Rounds Radio
Episode 116 - Justin Valentin, Rob Fuller, & David Durao - 3.13.18

Between Rounds Radio

Play Episode Listen Later Mar 13, 2018 67:21


It's Fight Week for Between Rounds Radio, as we're joined by three fighters from the card.  Justin Valentin and Rob Fuller compete for the Ammo Fight League Flyweight title and both talk about their journeys and the big fight.  They also speak with David Durao about his appearance on the Ammo Fight card and why he chose to become an MMA fighter.

mma rob fuller
Canterbury Mornings with Chris Lynch
Former NASA / US Air Force Engineer talks about preparing kids for jobs that might not exist yet

Canterbury Mornings with Chris Lynch

Play Episode Listen Later Oct 27, 2017 10:07


Chris Lynch speaks to Rob Fuller, former NASA and US Air Force engineer turned secondary school teacher, about Science, Technology, Engineering and Maths in school.

Canterbury Mornings with Chris Lynch
Former NASA / US Air Force Engineer talks about preparing kids for jobs that might not exist yet

Canterbury Mornings with Chris Lynch

Play Episode Listen Later Oct 26, 2017 10:07


Chris Lynch speaks to Rob Fuller, former NASA and US Air Force engineer turned secondary school teacher, about Science, Technology, Engineering and Maths in school.

PopHealth Podcast
From Obamacare to Trumpcare: Why YOU Should Care

PopHealth Podcast

Play Episode Listen Later May 30, 2017 42:17


Harry Nelson and his law firm, Nelson Hardiman, have established themselves as some of the leading healthcare attorneys in the United States.  Following the passage of the Affordable Care Act, Harry and his team have worked nonstop to help their healthcare clients navigate the new realities of healthcare and the implications it involved.  With the future of our nation’s healthcare system thrown into disarray after the election of Donald Trump, Harry and his team became frustrated with the misinformation and hyper-partisan rhetoric that followed.  Given his deep knowledge of the healthcare system, he and fellow attorney Rob Fuller authored the best-selling book “From Obamacare to Trumpcare: Why YOU should care” to dispel myths being propagated by both sides of the aisle and provide some clarity of what we can expect moving forward.  Together we explore the ideas in the book, from Medicare and Medicaid, to what individuals and organizations should prepare for, regardless of what comes out of Washington D.C.

Brakeing Down Security Podcast
2016-042-Audio from Source Seattle 2016 Conference

Brakeing Down Security Podcast

Play Episode Listen Later Oct 24, 2016 92:53


Join us for a special episode this week! I (Bryan) was able to attend my first Source Seattle convention. Two days of talks, technical and non-technical, combining red/blue team concepts, as well as professional development, to help you navigate the corporate waters easier. I was able to interview a number of people from the conference. You can see a partial list of them here: http://www.sourceconference.com/single-post/2016/09/30/SOURCE-Seattle-Highlights Interviewed Chip McSweeney from OpenDNS (@chipmcmalware) and Rob Cheyne about the conference and got a bit of information about Chip's talk on "Domain Generating Algorithms" (DGA) that #malware use for domain C&C, and how to detect and reverse certain algos. Rob Cheyne is the organizer of Source, so we talked a bit about the history and difficulties putting on 3 of these a year, and what makes the "Source" conference format so different. Masha Sedova was one of the keynote speakersto discuss how she gamified her information security program and got everyone involved. Really excellent talk about changing organizational behavior. Rob Fuller gave two days of Metasploit training, to show the versatility and to teach about the effectiveness of this tool. I also ask if Metasploit has reached it's end, since it's easily detected in many environments. Rob is a great interview and gives me his unvarnished opinion. Mike Shema from https://cobalt.io/ discussed expanding and tailoring your bug bounty program to suit your organization and to ensure that your bug bounty program is mature. Using private bug bounties, and ensuring proper follow through in a timely manner can ensure maximum bang for the buck. Last but not least, Deidre Diamond who did a keynote about 'Words to Stop Using now'. Deidre is the CEO of a national cyber security staffing company (Cyber Security Network) and Founder of a not-for-profit that empowers women in the infosec industry. Hear her thoughts on how leadership training is needed in the corporate environment, I ask her why we still need recruiters with hiring sites and why job descriptions are still a thorn in everyone's sides. Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-042-Source_Seattle_2016_audio.mp3 iTunes: https://itunes.apple.com/us/podcast/2016-042-audio-from-source/id799131292?i=1000377063127&mt=2 YouTube: https://www.youtube.com/watch?v=sj_SD2k7zXw #RSS: http://www.brakeingsecurity.com/rss #SoundCloud: https://www.soundcloud.com/bryan-brake Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security #Podcast on #Patreon: https://www.patreon.com/bds_podcast #Twitter: @brakesec @boettcherpwned @bryanbrake #Facebook: https://www.facebook.com/BrakeingDownSec/ #Tumblr: http://brakeingdownsecurity.tumblr.com/ #Player.FM : https://player.fm/series/brakeing-down-security-podcast #Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr #TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582    

ceo founders seattle conference player soundcloud chip cc stop using opendns metasploit rob fuller deidre diamond tunein radio app masha sedova mikeshema rob cheyne brakeing down security podcast
The Forensic Lunch with David Cowen and Matthew Seyer

We had an interesting Forensic Lunch today with:Rob Fuller, @mubix, talking about his new project, project mentor http://www.projectmentor.net/ where Rob is offering to help mentor you into developing the real technical skills in infosec and dfir to get into the industry and other noble aspirations.David Dym, @dave873, talking about the latest version of Metadiver which is available to download at http://www.easymetadata.com/wp/ which can crawl a directory and pull out all the metadata it can find into xls, json, xml and other formats. He also makes shadowkit.Kevin Stokes talking about how to extend and expand our USB Multiboot Dongle, you can download the dongle image here: https://mega.co.nz/#!i45WhQya!SQILk0T...Zoltan Szabo, talking about his stance on Digital Forensics as a science.You can email him at zoltandfw@gmail.com if you want to give your feedback to his opinions.

In-Security
Legal Wiretapping – Episode 035

In-Security

Play Episode Listen Later Jun 26, 2015 36:23


EP035 Legal Wiretapping First off: No. We didn’t call the whole show off after Rob Fuller’s interview. Although we thought we’d reached a pinnacle there we quickly realized that the information security news and infotech problems are still going so we might as well too. In reality we had an unfortunate series of health and ... Read more The post Legal Wiretapping – Episode 035 appeared first on In-security Podcast.

In-Security
Legal Wiretapping – Episode 035

In-Security

Play Episode Listen Later Jun 26, 2015 36:23


EP035 Legal Wiretapping First off: No. We didn't call the whole show off after Rob Fuller's interview. Although we thought we'd reached a pinnacle there we quickly realized that the information security news and infotech problems are still going so we might as well too. In reality we had an unfortunate series of health and ... Read more The post Legal Wiretapping – Episode 035 appeared first on In-security Podcast.

In-Security
Open Source Security Architecture Group – Episode 034

In-Security

Play Episode Listen Later Mar 17, 2015 43:02


EP034 Open Source Security Architecture Group Oh boy do we have an episode for you! This is our first ever interview and with an entertaining guy Rob Fuller also known as Mubix. He took the time to discuss with us (well, Max mostly) The plans for the Open Source Security Architecture Group. Or at least ... Read more The post Open Source Security Architecture Group – Episode 034 appeared first on In-security Podcast.

In-Security
Open Source Security Architecture Group – Episode 034

In-Security

Play Episode Listen Later Mar 17, 2015 43:02


EP034 Open Source Security Architecture Group Oh boy do we have an episode for you! This is our first ever interview and with an entertaining guy Rob Fuller also known as Mubix. He took the time to discuss with us (well, Max mostly) The plans for the Open Source Security Architecture Group. Or at least ... Read more The post Open Source Security Architecture Group – Episode 034 appeared first on In-security Podcast.

Paul's Security Weekly TV
Episode 370: Interview with Rob Fuller

Paul's Security Weekly TV

Play Episode Listen Later Apr 20, 2014 25:33


rob fuller
Paul's Security Weekly
Interview with Rob Fuller - Episode 370, Part 1 - April 17, 2014

Paul's Security Weekly

Play Episode Listen Later Apr 20, 2014 25:26


rob fuller
SecuraBit
SecuraBit Episode 69: Picking Locks and Messing up Podcasts, Welcome to Gringo Village!

SecuraBit

Play Episode Listen Later Nov 7, 2010 58:51


SecuraBit Episode 69: Picking Locks and Messing up Podcasts, Welcome to Gringo Village! November 3, 2010 Hosts: Christopher Mills – @thechrisam Andrew Borel –  @andrew_secbit Anthony Gartner – @anthonygartner http://anthonygartner.com Jason Mueller – @securabit_jay Rob Fuller – @mubix Tim Krabec – @tkrabec http://www.SMBMinute.com Guests: Deviant Ollum - http://deviating.net/ - Author of Syngress Practical Lock Picking General topics: Practical Lock Picking By Deviant Ollam http://www.syngress.com/hacking-and-penetration-testing/Practical-Lock-Picking/ Review submitted by a coworker: Practical Lock Picking by Deviant Ollum was an enjoyable read. The author does a good job of covering the art and science of picking locks. He chose two of the most common types of locks for the bulk of his material which helps keep the focus of the book tight. He leads the reader from the basic operational principles of the locks, to flaws in the design & manufacture and finally how to pick the locks. The coverage of pick types and other tools of the trade round out the readers knowledge of the subject. His down to earth style and simple language help the reader understand the material and develop the skills to pick these types of locks. His logical progression of starting with one pin and working your way up to all the pins in the lock will help the reader build confidence in their skills. The final sections on bypassing the door reminds the reader that locks are part of a system and sometimes the way to defeat a system is not the direct approach. Overall I would give this book 4 out of 4 stars. Shmoocon Tickets?? The Open Organization Of Lockpickers http://toool.us/ Lock Picking Videos - http://www.youtube.com/deviantollam General Information http://deviating.net/lockpicking/ IE Zero Day Microsoft Security Advisory (2458511) Vulnerability in Internet Explorer Could Allow Remote Code Execution http://www.microsoft.com/technet/security/advisory/2458511.mspx Enhanced Mitigation Experience Toolkit v2.0 http://www.microsoft.com/downloads/en/details.aspx?FamilyID=c6f0a6ee-05ac-4eb6-acd0-362559fd2f04 SpyEye v. ZeuS Rivalry Ends in Quiet Merger http://krebsonsecurity.com/2010/10/spyeye-v-zeus-rivalry-ends-in-quiet-merger/ Use our discount code "Connect_SecuraBit10" to get 10% off of ANY training course. The discount code is0 good for all SANS courses in all formats. Upcoming events #BSidesDFW November 6, 2010 #BSidesDE November 6, 2010 AppSec DC 2010 November 8-12, 2010 #BSidesOttawa November 12-13, 2010 RUXCON 2010 December 4-5, 2010 DojoCon December 11-12, 2010 #BSidesBerlin December 28-30, 2010 ShmooCon January 28-31, 2010 Links: http://securabit.com Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405 iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8

SecuraBit
SecuraByte Episode 1: DNS Haiku

SecuraBit

Play Episode Listen Later Jul 22, 2008 36:35


Today we introduce a new portion of the show: Securabytes. Securabytes are unannounced episodes, they could be last minute interviews or just more beer induced security speak. So, without further ado, here is the first Securabyte from the Securabit Podcast. "Introducing haiku-DNS: [laughing corruption collapsing kittens gallop nectars forgiving] = usa.gov" - Chris Wesley McGrew of McGrew Security, Martin McKeay of the Network Security Blog / Podcast, and some guy name Joel joined me (Rob Fuller) last night to discuss the DNS vulnerability leakage that happened about quitting time yesterday (7/21). We discuss the leak, how the vulnerability works, mitigating, and the potential it has on mass scales. Every one of the gentlemen that joined us, and we here at Securabit urge you to patch as soon as possible. If you need further information, please check the following links: Direct link to this episode: http://media.libsyn.com/media/securabit/securabytep01.mp3 Check to see if you are vulnerable: http://www.doxpara.com/ In depth explanation of the vulnerability: http://www.mcgrewsecurity.com/?p=151 More supporting links: http://www.mckeay.net/2008/07/21/patch-dns-now/ http://www.matasano.com/log/mtso/ http://www.doxpara.com/?p=1176 http://blogs.zdnet.com/security/?p=1520

dns haiku rob fuller martin mckeay