POPULARITY
The Yeoman Warders have guarded the Tower of London for 500 years, and is perhaps the oldest of jobs that still exists in our palaces today. In this final episode of a Day in the Life, we meet the Chief Yeoman Warder himself, Rob Fuller, and Curator Charles Farris fills us in on the storied history of this role. To find out more about the forgotten stories of those who worked at the royal palaces over 300 years ago, a new exhibition is opening at Kensington Palace. https://www.hrp.org.uk/kensington-palace/whats-on/untold-lives/
Nights is off to London tonight - The Tower of London to be exact. Rob Fuller is the New Chief Yeoman Warder at The Tower of London, and he joins us Nights to talk about his role as a Yeoman - or a "beefeater" as they're more commonly known.
Rob "Mubix" Fuller comes on the show to talk about penetration testing, what's changed over the years? He'll also discuss "Jurassic Malware" and creating games in your BIOS. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw783
Rob "Mubix" Fuller comes on the show to talk about penetration testing, what's changed over the years? He'll also discuss "Jurassic Malware" and creating games in your BIOS. This week in the Security News: 5-year old vulnerabilities, hijacking packages, EV charging apps that could steal stuff, do we even need software packages, selling hacking tools and ethics, I hate it when vendors fix stuff, HTTPS lock status, no pornhub for you! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw783
Rob "Mubix" Fuller comes on the show to talk about penetration testing, what's changed over the years? He'll also discuss "Jurassic Malware" and creating games in your BIOS. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw783
Rob "Mubix" Fuller comes on the show to talk about penetration testing, what's changed over the years? He'll also discuss "Jurassic Malware" and creating games in your BIOS. This week in the Security News: 5-year old vulnerabilities, hijacking packages, EV charging apps that could steal stuff, do we even need software packages, selling hacking tools and ethics, I hate it when vendors fix stuff, HTTPS lock status, no pornhub for you! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw783
Rob Fuller, Managing Director and Co-Founder of Sterasure and David Whiteside, Fractional Executive responsible for business development of BIHOCL (pronounced "bio sel") PureCleanse Antimicrobial Solution, speak with Linda about leveraging experienced fractional executives to bring products to the Canadian healthcare marketplace. Meet Rob, The Managing Director of Sterasure, a Canadian Medical device startup based in Kitchener/Waterloo, ON. Rob and his co-founder Bill launched Sterasure to improve patient outcomes through SSI prevention and technological innovations to tackle anti-microbial resistance across healthcare institutions globally. Rob has been involved in starting & building businesses in both healthcare and non-healthcare fields and recently exited another company he ran in the medical laser industry to focus his attention on tackling these urgent & pressing issues. Rob brings an eagerness and drive for solving complex problems, particularly in the medical device and biotechnology sector. Sterasure has recently launched BIHOCL PureCleanse, a new innovative antimicrobial skin and wound solution. To learn more, please go to www.bihocl.com David Whiteside is a seasoned professional with over 20 years of experience in the medical device industry. As a sales and marketing leader, he deeply understands market access, key account management, and GPO operations. Throughout his career, David has worked with a range of companies, starting with large multinationals such as Johnson & Johnson, Medela, and Hollister, and now specializes in helping smaller Canadian health science companies grow their revenue in Canada, the U.S.A and Europe. With his expertise and entrepreneurial spirit, David has a proven track record of success in driving revenue and growth for his clients. His passion for the industry and his experience and leadership skills make him a valuable ‘fractional' asset to any team.
Watch when Jack Rhysider of Darknet Diaries shares his amazement at what hackers will do “for a free burrito,” or the moment Rob Fuller, a read team and CTI director, condemns security awareness training. From journalists to OSINT investigators to dark web experts, here are some of the best moments we shared with guests last season.
In this episode of the RH-ISAC podcast, RH-ISAC member, Rob Fuller, shares his first-hand experience with vulnerability disclosure, or bug bounty programs, the benefits, the challenges, and some tips for getting your program off the ground. Thank you to Fortinet for their sponsorship of the RH-ISAC podcast.
This week we continue our series on how to break into a cybersecurity career with long time industry veteran, Rob Fuller (Mubix). Rob speaks with us about how he started his career in the Marine Corps, his time on Hak5, and more recently earning his Masters degree. Rob also talks about how these experiences has […] The post How to Break Into a Cybersecurity Career – Rob Fuller (Mubix) appeared first on The Shared Security Show.
Are you one of those that have a real estate dream they want to realize but just don't know how? Then this podcast is for you! Join us as Rob Fuller, a real estate developer, investor, and visionary, shares his journey on getting into the business of buying and selling homes and gives exclusive takeaways on operating a real estate business! Love the show? Subscribe, rate, review, and share! REI INK – Magazine (rei-ink.com)
In episode 20 we interview Rob Fuller, the red team and CTI director for a major U.S. airline. Rob discusses how red teams can better leverage CTI, the grand mistakes of even the most security-conscious individuals, and why he thinks most security awareness training gets it wrong.
John Canzano talks with Rob Fuller from the Portland Football Officials Association. Fuller discusses what makes a good ref, the massive impact the pandemic had on refs in Oregon, getting refs ready for game action, how to put the best high school product out and much more! Subscribe NOW to this podcast for more great content. Follow @JohnCanzanoBFT on Twitter
On Friday's Bald Faced Truth, John Canzano is joined by two great guests. In the opening hour Rob Fuller from the Portland Football Officials Association joins to discuss the state of refereeing for High School sports in Oregon and the need for plenty more refs. For two segments in the second hour, University of Portland Vice President Michael Lewellyn joins John to talk about his time working as an executive for the Blazers, the Rooney rule and much more. We also talk about the Blazers trade off of Norman Powell, Kelly Graves, play punch-it audio and so much more! Subscribe NOW to this podcast for more great content. Follow @JohnCanzanoBFT on Twitter.
Whether you remember him as Col. Rob parker (WCW), or Tennessee Lee (WWF), Rob Fuller has a storied career that spans over two decades. From pro wrestler, to being one of the best managers of the 1990s, he shares his story with Johnny O . and Metal Ed on this installment of the Double Axe Handle Smash Podcast!Brought to you by: Gio's Pizzeria and lounge (www.giospizzeria.com)andwww.rubhouse.comWant to start your own podcast? Paste this link in your web browser:https://www.buzzsprout.com/?referrer_id=1773218
Dr. Rob Fuller, Chair of emergency medicine, UConn Health. Back after spending three weeks in Haiti running a medical clinic and preparing local providers to sustain it. See omnystudio.com/listener for privacy information.
"Mubix" joins the ghosts in the h4unt3d house and talks about his career, marines, uber, hak5, HBO's "silicone valley" and much more! Thanks Rob!
Rob Fuller, CPM® Sr. Facilities Manager at CBRE shares special considerations in infrastructure, systems, and staffing necessary when managing data centers.
Healthcare attorney Rob Fuller, a partner at Nelson Hardiman, discusses recent CDC guidance on masks and what it means for businesses. Paige Smith, Bloomberg Law Reporter for labor and employment, discusses employers separating vaccinated and unvaccinated workers, for example, by shift or floor. June Grasso hosts.
Healthcare attorney Rob Fuller, a partner at Nelson Hardiman, discusses recent CDC guidance on masks and what it means for businesses. Paige Smith, Bloomberg Law Reporter for labor and employment, discusses employers separating vaccinated and unvaccinated workers, for example, by shift or floor. June Grasso hosts. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Rob Fuller of Z Car Garage chats with Randy and Howard about the Nissan/Datsun market.
Today, available homes are as scarce as a rare earth mineral. Under 500K homes are available for sale today, well below the historic 1M-1.5M at any given time Source: Federal Reserve. High demand exists independent of low inventory. Developers and homebuilders need years to help us build our way out. The development team of Rob Fuller and Jared Garfield tell us how today’s developers cope with the rising cost and unpredictable supply of: copper, lumber, PVC and other building materials. Their project in Colorado Springs, CO is in the path of progress. In 2019, U.S. News & World Report named the area the #1 Economy In America. The Denver Post stated that by 2050, Colorado Springs will be larger than Denver. (Wow) The project is 800 acres of higher-end homes on 2.5-acre lots. Homes start in the high $600Ks. That does not work for cash flow via direct ownership. This is not “spec building”. Homeowners have already funded with non-refundable earnest money. You can project a construction loan to the project yourself. Cash-on-cash returns are 9% to 15%, depending on the investment amount. $100K minimum. Learn more about this project at www.GetRichEducation.com/ColoradoSprings. Investors have substantial guarantees and financial buffers. This is an A+ real estate asset class. You can view weekly project drone footage. On-site visits are available. I might attend one where you could meet me in-person in Colorado Springs. Resources mentioned: Private Lending in the Path Of Progress: GetRichEducation.com/ColoradoSprings U.S. Active Home Listing Count: https://fred.stlouisfed.org/series/ACTLISCOUUS Show Notes: www.GetRichEducation.com/343 Get mortgage loans for investment property: RidgeLendingGroup.com New Construction Turnkey Property: CashFlowAndGrowth.com Ali Boone’s Recommended Book: https://amzn.to/2NsMVlF EQRPs: text “EQRP” in ALL CAPS to 72000 or: eQRP.co By texting “EQRP” to 72000 and opting in, you will receive periodic marketing messages from eQRP Co. Message & data rates may apply. Reply “STOP” to cancel. Best Financial Education: GetRichEducation.com Get our free, wealth-building “Don’t Quit Your Daydream Letter”: www.GetRichEducation.com/Letter Top Properties & Providers: GREturnkey.com Follow us on Instagram: @getricheducation Keith’s personal Instagram: @keithweinhold
In this episode of the SECurity Awareness Series of the SEPodcast, Chris Hadnagy and Ryan MacDougall are joined by Brian Phillips who is responsible for information security at Macy’s. Listen as they discuss how to: build an information security organization, hire the right people, and get buy-in from executives. March 15, 2021 00:09 – Intro Social-Engineer.com Phishing As A Service® Vishing As A Service® 01:54 – Introduction to Brian Phillips 02:44 – Security in a retail environment and impacts from the pandemic 07:25 - How to build an information security organization from the ground up 10:14 – Changing an organization's mindset for better security 14:20 – The most desirable quality in a team member, and how to recognize it in an interview 18:21 – How to nurture an outsider into a security professional 22:48 - How to align corporate security initiatives with business goals Never Split the Difference: Negotiating As If Your Life Depended On It 26:38 – The importance of buy-in from the C-level down, and how to get it. 38:13 – Key takeaways that corporations should start doing now 40:17 – Brian’s most respected colleagues Dave Kennedy Ed Skoudis John Strand Rob Fuller Carlos Perez 42:14 – Brian's book recommendations Never Split the Difference: Negotiating As If Your Life Depended On It Thinking, Fast and Slow Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You How to Win Friends & Influence People Robin Dreke's Books: Sizing People Up: A Veteran FBI Agent's User Manual for Behavior Prediction It's Not All About Me: The Top Ten Techniques for Building Quick Rapport with Anyone The Code of Trust: An American Counterintelligence Expert's Five Rules to Lead and Succeed Joe Navarro’s Books: Be Exceptional: Master the Five Traits That Set Extraordinary People Apart The Dictionary of Body Language: A Field Guide to Human Behavior What Every Body Is Saying: An Ex-FBI Agent's Guide to Speed-Reading People (more) Leaders Eat Last: Why Some Teams Pull Together and Others Don't 44:03 – Conclusion Ryan on Twitter Brian on Twitter Chris on Twitter Social-Engineer.org Social-Engineer.com The Innocent Lives Foundation Clutch
In this episode, we catch up with @mubix (Rob Fuller), a is red teamer turned purple teamer. He started his career in the United States Marine Corps working with explosives and has gone on to have a highly successful career in the security industry working at companies like Rapid7, GE, Uber, Cruise Automation and now Balck Hills Information Security, as well as contributing back in many ways to the security community and speaking at many conferences around the world.Mubix shares his journey, stories along the way, as well as going deeper into both red and purple teaming.
Drew Gwerder sits down with Senior Point Guard Rob Fuller and Head Men's Basketball Coach Omar Sanchez ahead of their final game of the season on Saturday. They talk about senior day, Rob's journey as a Hawk and what the future may hold for him. Fuller also talks about what he's learned and gives advice to future Hawks.
Brakesec Podcast is now on Pandora! Find us here: https://pandora.app.link/p9AvwdTpT3 Book club Book club is starting up again with Hands-On AWS penetration testing with Kali Linux from Gilbert and Caudill. You read and get together to discuss or demo every Monday. Get the book, start reading and meet us for the kick off Monday the 24 at 10pm eastern. The book club meets virtually on zoom, and organizes on slack..get invited like this.” Book: https://smile.amazon.com/Hands-Penetration-Testing-Kali-Linux/dp/1789136725 NolaCon Training: https://nolacon.com/training/2020/security-detect-and-defense-ttx Roberto Rodriguez Bio @Cyb3rWard0g on Twitter Threat Intel vs. Threat Hunting = what’s the difference? What datasets are you using? Did you start with any particular dataset, or created your own? Technique development - what skills are needed? C2 setup Detection mechanisms Honeypots How can people get involved? Blacksmith - create ‘mordor’ environment to push scripts to setup honeypot/nets https://Threathunterplaybook.com https://github.com/hunters-forge/ThreatHunter-Playbook https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/lateral_movement/WIN-190815181010.html https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4 https://medium.com/threat-hunters-forge/writing-an-interactive-book-over-the-threat-hunter-playbook-with-the-help-of-the-jupyter-book-3ff37a3123c7 https://www.exploit-db.com/exploits/47995 - Sudo buffer overflow Mordor: The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption. YAML Example: https://github.com/hunters-forge/ThreatHunter-Playbook/blob/master/playbooks/WIN-190810201010.yaml Notebook Example: https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/lateral_movement/WIN-190810201010.html Jupyter notebook - Definition: https://jupyter-notebook-beginner-guide.readthedocs.io/en/latest/what_is_jupyter.html Lateral Movement - WMI - IMAGE Below SIGMA? What is a Notebook? Think of a notebook as a document that you can access via a web interface that allows you to save input (i.e live code) and output (i.e code execution results / evaluated code output) of interactive sessions as well as important notes needed to explain the methodology and steps taken to perform specific tasks (i.e data analysis). https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4 Have a goal for expanding to other parts of ATT&CK? Threat Hunter Playbook - Goals Expedite the development of techniques an hypothesis for hunting campaigns. Help Threat Hunters understand patterns of behavior observed during post-exploitation. Reduce the number of false positives while hunting by providing more context around suspicious events. Share real-time analytics validation examples through cloud computing environments for free. Distribute Threat Hunting concepts and processes around the world for free. Map pre-recorded datasets to adversarial techniques. Accelerate infosec learning through open source resources. Sub-techniques: https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a Slack Channel: https://launchpass.com/threathunting Twitter; https://twitter.com/mattifestation https://twitter.com/tifkin_ https://twitter.com/choldgraf https://twitter.com/Cyb3rPandaH on Brakeing Down Security Podcast on #Pandora- https://www.pandora.com/podcast/brakeing-down-security-podcast/PC:27866 Marcus Carey https://twitter.com/marcusjcarey Prolific Author, Defender, Enterprise Architect at ReliaQuest https://twitter.com/egyp7 https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950 “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.” Security model - everyone’s is diff How do you work with your threat model? A proper threat model Attack Simulation - How is this different from doing a typical Incident Response tabletop? Threat modeling systems? How is this different than a pentest? Is this automated red teaming? How effective can automated testing be? Is this like some kind of constant scanning system? How does this work with threat intel feeds? Can it simulate ransomware, or any attacks? Hedgehog principles A lot of things crappily, and nothing good Mr. Boettcher: “Why suck at everything…” Atomic Red Team - https://github.com/redcanaryco/atomic-red-team ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/ Tribe of Hackers https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 - Red Book The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #Pandora: https://pandora.app.link/p9AvwdTpT3 #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
In this episode of the ACTIVATE U Podcast we talk with Rob from Spartan Firearms and we talk about his journey to starting his business. Rob provides a great perspective on how he came from the commercial lending industry and was bale to use that knowledge to adapt to his business. He shares how going through economy and business issues can be stressful but also how you can adapt to them! This is a unique conversation with a great business owner! http://www.spartanfirearms.us/ https://www.facebook.com/pg/SpartanFirearmsMinot/about/?ref=page_internal
Brakeing Down Security Podcast on #Pandora- https://www.pandora.com/podcast/brakeing-down-security-podcast/PC:27866 Marcus Carey https://twitter.com/marcusjcarey Prolific Author, Defender, Enterprise Architect at ReliaQuest https://twitter.com/egyp7 https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950 “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.” Security model - everyone’s is diff How do you work with your threat model? A proper threat model Attack Simulation - How is this different from doing a typical Incident Response tabletop? Threat modeling systems? How is this different than a pentest? Is this automated red teaming? How effective can automated testing be? Is this like some kind of constant scanning system? How does this work with threat intel feeds? Can it simulate ransomware, or any attacks? Hedgehog principles A lot of things crappily, and nothing good Mr. Boettcher: “Why suck at everything…” Atomic Red Team - https://github.com/redcanaryco/atomic-red-team ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/ Tribe of Hackers https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 - Red Book The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
Marcus Carey https://twitter.com/marcusjcarey Prolific Author, Defender, Enterprise Architect at ReliaQuest https://twitter.com/egyp7 https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950 “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.” Security model - everyone’s is diff How do you work with your threat model? A proper threat model Attack Simulation - How is this different from doing a typical Incident Response tabletop? Threat modeling systems? How is this different than a pentest? Is this automated red teaming? How effective can automated testing be? Is this like some kind of constant scanning system? How does this work with threat intel feeds? Can it simulate ransomware, or any attacks? Hedgehog principles A lot of things crappily, and nothing good Mr. Boettcher: “Why suck at everything…” Atomic Red Team - https://github.com/redcanaryco/atomic-red-team ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/ Tribe of Hackers https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 - Red Book The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
On Episode #162 of Sean's Sports Show, Sean reports each and every breaking news story in sports and gives his unique perspective on each one, which include: the boss of FIFA not approving La Liga matches to be played in the USA (3:20), Russel Westbrook saying that we should not panic after the Oklahoma City Thunder start 0-4 (5:00), the Lakers getting their first home win of the season and first win at Staples Center with LeBron James (7:56), Rob Fuller of the Houston Texans tearing his ACL (8:38), the Boston Red Sox accusing Manny Machado of the Los Angeles Dodgers of stealing signs (9:24), the Houston Rockets and Minnesota Timberwolves being at a standstill with a possible Jimmy Butler trade (12:30), Demarcus Cousins getting ejected before he played a second with the Golden State Warriors (14:27), JD Martinez and Christian Yelich winning the Hank Aaron award (17:40), and Kevin Durant going off for 41 points at MSG vs the New York Knicks (17:40). Sean also covers the news, results, and future matchups of the LA Sports Teams (19:00). I AM NOW A SPORTS WRITER FOR www.allteamz.com I will be writing and publishing articles regularly. I have published my first article and here is the link: https://wp.me/p7BkhM-rV EPISODE 162 AND EVERY OTHER EPISODE OF SEAN'S SPORTS SHOW IS AVAILABLE ON EVERY PODCAST PLATFORM (INCLUDES ITUNES AND SPOTIFY). IF YOU ENJOYED THIS EPISODE, FEEL FREE TO LEAVE A 5 STAR REVIEW ON ITUNES AND SUBSCRIBE TO KNOW ABOUT FUTURE EPISODES. IF YOU WOULD LIKE THIS PODCAST TO KEEP GOING, PLEASE DONATE WHATEVER MONEY YOU CAN. I PLEDGE TO USE ANY MONEY THAT YOU DO DONATE FOR THE SOLE PURPOSE OF MAKING THIS PODCAST BETTER! FOLLOW ME ON INSTAGRAM: @sean.tiplitsky @seanssportshow FOLLOW ME ON TWITTER: @seanssportshow ADD ME ON FACEBOOK: Sean's Sports Show --- Send in a voice message: https://anchor.fm/seanssportsstop/message Support this podcast: https://anchor.fm/seanssportsstop/support
Practical advice on submitting and writing effective findings for bug bounties and reports. Rob Fuller (@mubix) talks about his path into security, CCDC, volunteerism, NoVA Hackers and more.
Practical advice on submitting and writing effective findings for bug bounties and reports. Rob Fuller (@mubix) talks about his path into security, CCDC, volunteerism, NoVA Hackers and more.
It's Fight Week for Between Rounds Radio, as we're joined by three fighters from the card. Justin Valentin and Rob Fuller compete for the Ammo Fight League Flyweight title and both talk about their journeys and the big fight. They also speak with David Durao about his appearance on the Ammo Fight card and why he chose to become an MMA fighter.
Chris Lynch speaks to Rob Fuller, former NASA and US Air Force engineer turned secondary school teacher, about Science, Technology, Engineering and Maths in school.
Chris Lynch speaks to Rob Fuller, former NASA and US Air Force engineer turned secondary school teacher, about Science, Technology, Engineering and Maths in school.
Harry Nelson and his law firm, Nelson Hardiman, have established themselves as some of the leading healthcare attorneys in the United States. Following the passage of the Affordable Care Act, Harry and his team have worked nonstop to help their healthcare clients navigate the new realities of healthcare and the implications it involved. With the future of our nation’s healthcare system thrown into disarray after the election of Donald Trump, Harry and his team became frustrated with the misinformation and hyper-partisan rhetoric that followed. Given his deep knowledge of the healthcare system, he and fellow attorney Rob Fuller authored the best-selling book “From Obamacare to Trumpcare: Why YOU should care” to dispel myths being propagated by both sides of the aisle and provide some clarity of what we can expect moving forward. Together we explore the ideas in the book, from Medicare and Medicaid, to what individuals and organizations should prepare for, regardless of what comes out of Washington D.C.
Join us for a special episode this week! I (Bryan) was able to attend my first Source Seattle convention. Two days of talks, technical and non-technical, combining red/blue team concepts, as well as professional development, to help you navigate the corporate waters easier. I was able to interview a number of people from the conference. You can see a partial list of them here: http://www.sourceconference.com/single-post/2016/09/30/SOURCE-Seattle-Highlights Interviewed Chip McSweeney from OpenDNS (@chipmcmalware) and Rob Cheyne about the conference and got a bit of information about Chip's talk on "Domain Generating Algorithms" (DGA) that #malware use for domain C&C, and how to detect and reverse certain algos. Rob Cheyne is the organizer of Source, so we talked a bit about the history and difficulties putting on 3 of these a year, and what makes the "Source" conference format so different. Masha Sedova was one of the keynote speakersto discuss how she gamified her information security program and got everyone involved. Really excellent talk about changing organizational behavior. Rob Fuller gave two days of Metasploit training, to show the versatility and to teach about the effectiveness of this tool. I also ask if Metasploit has reached it's end, since it's easily detected in many environments. Rob is a great interview and gives me his unvarnished opinion. Mike Shema from https://cobalt.io/ discussed expanding and tailoring your bug bounty program to suit your organization and to ensure that your bug bounty program is mature. Using private bug bounties, and ensuring proper follow through in a timely manner can ensure maximum bang for the buck. Last but not least, Deidre Diamond who did a keynote about 'Words to Stop Using now'. Deidre is the CEO of a national cyber security staffing company (Cyber Security Network) and Founder of a not-for-profit that empowers women in the infosec industry. Hear her thoughts on how leadership training is needed in the corporate environment, I ask her why we still need recruiters with hiring sites and why job descriptions are still a thorn in everyone's sides. Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-042-Source_Seattle_2016_audio.mp3 iTunes: https://itunes.apple.com/us/podcast/2016-042-audio-from-source/id799131292?i=1000377063127&mt=2 YouTube: https://www.youtube.com/watch?v=sj_SD2k7zXw #RSS: http://www.brakeingsecurity.com/rss #SoundCloud: https://www.soundcloud.com/bryan-brake Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security #Podcast on #Patreon: https://www.patreon.com/bds_podcast #Twitter: @brakesec @boettcherpwned @bryanbrake #Facebook: https://www.facebook.com/BrakeingDownSec/ #Tumblr: http://brakeingdownsecurity.tumblr.com/ #Player.FM : https://player.fm/series/brakeing-down-security-podcast #Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr #TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582
We had an interesting Forensic Lunch today with:Rob Fuller, @mubix, talking about his new project, project mentor http://www.projectmentor.net/ where Rob is offering to help mentor you into developing the real technical skills in infosec and dfir to get into the industry and other noble aspirations.David Dym, @dave873, talking about the latest version of Metadiver which is available to download at http://www.easymetadata.com/wp/ which can crawl a directory and pull out all the metadata it can find into xls, json, xml and other formats. He also makes shadowkit.Kevin Stokes talking about how to extend and expand our USB Multiboot Dongle, you can download the dongle image here: https://mega.co.nz/#!i45WhQya!SQILk0T...Zoltan Szabo, talking about his stance on Digital Forensics as a science.You can email him at zoltandfw@gmail.com if you want to give your feedback to his opinions.
EP035 Legal Wiretapping First off: No. We didn’t call the whole show off after Rob Fuller’s interview. Although we thought we’d reached a pinnacle there we quickly realized that the information security news and infotech problems are still going so we might as well too. In reality we had an unfortunate series of health and ... Read more The post Legal Wiretapping – Episode 035 appeared first on In-security Podcast.
EP035 Legal Wiretapping First off: No. We didn't call the whole show off after Rob Fuller's interview. Although we thought we'd reached a pinnacle there we quickly realized that the information security news and infotech problems are still going so we might as well too. In reality we had an unfortunate series of health and ... Read more The post Legal Wiretapping – Episode 035 appeared first on In-security Podcast.
EP034 Open Source Security Architecture Group Oh boy do we have an episode for you! This is our first ever interview and with an entertaining guy Rob Fuller also known as Mubix. He took the time to discuss with us (well, Max mostly) The plans for the Open Source Security Architecture Group. Or at least ... Read more The post Open Source Security Architecture Group – Episode 034 appeared first on In-security Podcast.
EP034 Open Source Security Architecture Group Oh boy do we have an episode for you! This is our first ever interview and with an entertaining guy Rob Fuller also known as Mubix. He took the time to discuss with us (well, Max mostly) The plans for the Open Source Security Architecture Group. Or at least ... Read more The post Open Source Security Architecture Group – Episode 034 appeared first on In-security Podcast.
SecuraBit Episode 69: Picking Locks and Messing up Podcasts, Welcome to Gringo Village! November 3, 2010 Hosts: Christopher Mills – @thechrisam Andrew Borel – @andrew_secbit Anthony Gartner – @anthonygartner http://anthonygartner.com Jason Mueller – @securabit_jay Rob Fuller – @mubix Tim Krabec – @tkrabec http://www.SMBMinute.com Guests: Deviant Ollum - http://deviating.net/ - Author of Syngress Practical Lock Picking General topics: Practical Lock Picking By Deviant Ollam http://www.syngress.com/hacking-and-penetration-testing/Practical-Lock-Picking/ Review submitted by a coworker: Practical Lock Picking by Deviant Ollum was an enjoyable read. The author does a good job of covering the art and science of picking locks. He chose two of the most common types of locks for the bulk of his material which helps keep the focus of the book tight. He leads the reader from the basic operational principles of the locks, to flaws in the design & manufacture and finally how to pick the locks. The coverage of pick types and other tools of the trade round out the readers knowledge of the subject. His down to earth style and simple language help the reader understand the material and develop the skills to pick these types of locks. His logical progression of starting with one pin and working your way up to all the pins in the lock will help the reader build confidence in their skills. The final sections on bypassing the door reminds the reader that locks are part of a system and sometimes the way to defeat a system is not the direct approach. Overall I would give this book 4 out of 4 stars. Shmoocon Tickets?? The Open Organization Of Lockpickers http://toool.us/ Lock Picking Videos - http://www.youtube.com/deviantollam General Information http://deviating.net/lockpicking/ IE Zero Day Microsoft Security Advisory (2458511) Vulnerability in Internet Explorer Could Allow Remote Code Execution http://www.microsoft.com/technet/security/advisory/2458511.mspx Enhanced Mitigation Experience Toolkit v2.0 http://www.microsoft.com/downloads/en/details.aspx?FamilyID=c6f0a6ee-05ac-4eb6-acd0-362559fd2f04 SpyEye v. ZeuS Rivalry Ends in Quiet Merger http://krebsonsecurity.com/2010/10/spyeye-v-zeus-rivalry-ends-in-quiet-merger/ Use our discount code "Connect_SecuraBit10" to get 10% off of ANY training course. The discount code is0 good for all SANS courses in all formats. Upcoming events #BSidesDFW November 6, 2010 #BSidesDE November 6, 2010 AppSec DC 2010 November 8-12, 2010 #BSidesOttawa November 12-13, 2010 RUXCON 2010 December 4-5, 2010 DojoCon December 11-12, 2010 #BSidesBerlin December 28-30, 2010 ShmooCon January 28-31, 2010 Links: http://securabit.com Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405 iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8
Today we introduce a new portion of the show: Securabytes. Securabytes are unannounced episodes, they could be last minute interviews or just more beer induced security speak. So, without further ado, here is the first Securabyte from the Securabit Podcast. "Introducing haiku-DNS: [laughing corruption collapsing kittens gallop nectars forgiving] = usa.gov" - Chris Wesley McGrew of McGrew Security, Martin McKeay of the Network Security Blog / Podcast, and some guy name Joel joined me (Rob Fuller) last night to discuss the DNS vulnerability leakage that happened about quitting time yesterday (7/21). We discuss the leak, how the vulnerability works, mitigating, and the potential it has on mass scales. Every one of the gentlemen that joined us, and we here at Securabit urge you to patch as soon as possible. If you need further information, please check the following links: Direct link to this episode: http://media.libsyn.com/media/securabit/securabytep01.mp3 Check to see if you are vulnerable: http://www.doxpara.com/ In depth explanation of the vulnerability: http://www.mcgrewsecurity.com/?p=151 More supporting links: http://www.mckeay.net/2008/07/21/patch-dns-now/ http://www.matasano.com/log/mtso/ http://www.doxpara.com/?p=1176 http://blogs.zdnet.com/security/?p=1520