Podcasts about syngress publishing

  • 6PODCASTS
  • 7EPISODES
  • 45mAVG DURATION
  • ?INFREQUENT EPISODES
  • Nov 6, 2019LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about syngress publishing

Latest podcast episodes about syngress publishing

Cyber Security Café
Are hackers born or are they created? How can cybersecurity professionals secure the family home and can we ever outsource penetration testing? with CHRIS GATFORD

Cyber Security Café

Play Episode Listen Later Nov 6, 2019 40:11


THE INTRO ​Louisa has been in New York at a Cyber insurance conference and shares her insights from a couple of the sessions including what people want their cyber insurance policy to cover and whether or not millennials care about privacy including the impact digital savviness may have on thisBeverley wants to know who the greatest conmen of our time was and Louisa thinks Frank Abagnale Jr. is a good candidate and there are lots techniques Frank used that are still used today.Louisa and Beverley discuss the different definitions of social engineeringBeverley is excited to have Chris Gatford on the podcast today​​​THE CHAT​​Chris Gatford is the director of Hacktive in Sydney, Australia and performs penetration tests for organisations all around the world. Chris has performed thousands of penetration tests in his career and has reviewed countless IT environments and has directed and been responsible for numerous security assessments for a variety of corporations and government departmentsChris has co-authored two books, including “Network Security Assessment: From Vulnerability to Patch” from Syngress Publishing.​For the full Transcript of the chat visit this linkprovided for free by Otter.ai (unedited)​THE DEBRIEF​Louisa is seeing some themes emerge from the podcast interviews in terms of the key skillsets needed to be in cybersecurity and the criticality of curiosityBeverley agrees with Chris on why it is so hard to secure the family homeBeverley is also glad to hear that millennials are asking big questions about privacyBeverley shares her view on whether penetration testing can be outsourced including the use of bug bounty programs and the role of trustWhy we need another podcast to look at how our roles might change in the future and how we prepare for thatHow the BBQ/taxi conversation has changed and why we need to be ready to change our message as the criminals evolve​How to follow Chriswebsite: https://www.hacktive.ioEmail: chris@hacktive.io Twitter: @ChrisGatford​CREDITS​Guest: Chris GatfordHosts: Beverley Roche and Louisa Vogelenzang https://www.cybersecuritycafe.com.au/co-hostsProducer/Editor: Louisa VogelenzangSound Producer: Darcy Milne (Propodcastproduction.com)​RESEARCH Digital literacy survey mentioned at the panel discussion Louisa attended in New York https://www.nominet.uk/digital-generation-gap-remains-wide-open-older-generations-fail-embrace-new-technology/Frank Abignale on why tech has made things 4000x easier for criminals https://www.techrepublic.com/article/famous-con-man-frank-abagnale-crime-is-4000-times-easier-today/Splendour in the grass science tent https://inspiringnsw.org.au/2019/06/27/science-tent-returns-to-splendour/Open DNS solution mentioned by Chris during the chat https://www.opendns.com​CONTACT THE CYBERSECURITY CAFÉJoin our LinkedIn Group https://www.linkedin.com/company/the-cybersecurity-caféEmail us:louisa@cybersecuritycafe.com.aubeverley@cybersecuritycafe.com.auVisit our website: https://www.cybersecuritycafe.com.auWant to be on the show? Send us your bio and an overview on what you want to chat about and we'll be in touch asap.We also welcome guest suggestions – in particular we'd love to hear from new voices in the industry who have new ideas to share about the human side of security.See omnystudio.com/listener for privacy information.

Cybersecurity Café
Are hackers born or are they created? How can cybersecurity professionals secure the family home and can we ever outsource penetration testing? with CHRIS GATFORD

Cybersecurity Café

Play Episode Listen Later Nov 6, 2019 40:11


THE INTRO ​Louisa has been in New York at a Cyber insurance conference and shares her insights from a couple of the sessions including what people want their cyber insurance policy to cover and whether or not millennials care about privacy including the impact digital savviness may have on thisBeverley wants to know who the greatest conmen of our time was and Louisa thinks Frank Abagnale Jr. is a good candidate and there are lots techniques Frank used that are still used today.Louisa and Beverley discuss the different definitions of social engineeringBeverley is excited to have Chris Gatford on the podcast today​​​THE CHAT​​Chris Gatford is the director of Hacktive in Sydney, Australia and performs penetration tests for organisations all around the world. Chris has performed thousands of penetration tests in his career and has reviewed countless IT environments and has directed and been responsible for numerous security assessments for a variety of corporations and government departmentsChris has co-authored two books, including “Network Security Assessment: From Vulnerability to Patch” from Syngress Publishing.​For the full Transcript of the chat visit this linkprovided for free by Otter.ai (unedited)​THE DEBRIEF​Louisa is seeing some themes emerge from the podcast interviews in terms of the key skillsets needed to be in cybersecurity and the criticality of curiosityBeverley agrees with Chris on why it is so hard to secure the family homeBeverley is also glad to hear that millennials are asking big questions about privacyBeverley shares her view on whether penetration testing can be outsourced including the use of bug bounty programs and the role of trustWhy we need another podcast to look at how our roles might change in the future and how we prepare for thatHow the BBQ/taxi conversation has changed and why we need to be ready to change our message as the criminals evolve​How to follow Chriswebsite: https://www.hacktive.ioEmail: chris@hacktive.io Twitter: @ChrisGatford​CREDITS​Guest: Chris GatfordHosts: Beverley Roche and Louisa Vogelenzang https://www.cybersecuritycafe.com.au/co-hostsProducer/Editor: Louisa VogelenzangSound Producer: Darcy Milne (Propodcastproduction.com)​RESEARCH Digital literacy survey mentioned at the panel discussion Louisa attended in New York https://www.nominet.uk/digital-generation-gap-remains-wide-open-older-generations-fail-embrace-new-technology/Frank Abignale on why tech has made things 4000x easier for criminals https://www.techrepublic.com/article/famous-con-man-frank-abagnale-crime-is-4000-times-easier-today/Splendour in the grass science tent https://inspiringnsw.org.au/2019/06/27/science-tent-returns-to-splendour/Open DNS solution mentioned by Chris during the chat https://www.opendns.com​CONTACT THE CYBERSECURITY CAFÉJoin our LinkedIn Group https://www.linkedin.com/company/the-cybersecurity-caféEmail us:louisa@cybersecuritycafe.com.aubeverley@cybersecuritycafe.com.auVisit our website: https://www.cybersecuritycafe.com.auWant to be on the show? Send us your bio and an overview on what you want to chat about and we’ll be in touch asap.We also welcome guest suggestions – in particular we’d love to hear from new voices in the industry who have new ideas to share about the human side of security.

Paul's Security Weekly
Interview with Champ Clark - Episode 356, Part 1 - December 12, 2013

Paul's Security Weekly

Play Episode Listen Later Dec 14, 2013 53:38


Champ Clark, also know as "Da Beave" in some circles, is the CTO of Quadrant Information Security headquartered in Jacksonville, Florida. He is one of the founding members of the VoIP hacking group Telephreakand runs the Deathrow OpenVMS cluster. He has co-authored books published by Syngress Publishing and has been interviewed by various magazines. He has spoken at conferences on topics such as "war dialing" the world with VoIP, exploring X.25 networks around the world, and most recently, real time log analysis with "Sagan", software he developed.

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Attendees will learn how to torque Google to detect SQL injection points and login portals, execute portscans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious ""Google hackers"", this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The speaker, Johnny Long, maintains the Internet's most comprehensive database of Google exposures on his website. Johnny Long did not develop his skills within the hallowed halls of higher learning but rather by spending way too many late nights huddled in front of his computer, developing his anti-social tendencies. Mr Long (Johnny's professional alter-ego) has previously presented at SANS and other computer security conferences nationwide. In addition, he has presented before several government alphabet-soup entities including three starting with the letter 'A', four starting with the letter 'D', a handful starting with the letters 'F' and 'S' and two starting with the today's letter, the letter 'N'. During his career as an attack and penetration specialist, Mr Long has performed active network and physical security assessments (one in the cube is worth twenty on the net) for hundreds of government and commercial clients. Johnny Long is the Author of 'Penetration Testing with Google', available December 2004 from Syngress Publishing"

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Attendees will learn how to torque Google to detect SQL injection points and login portals, execute portscans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious ""Google hackers"", this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The speaker, Johnny Long, maintains the Internet's most comprehensive database of Google exposures on his website. Johnny Long did not develop his skills within the hallowed halls of higher learning but rather by spending way too many late nights huddled in front of his computer, developing his anti-social tendencies. Mr Long (Johnny's professional alter-ego) has previously presented at SANS and other computer security conferences nationwide. In addition, he has presented before several government alphabet-soup entities including three starting with the letter 'A', four starting with the letter 'D', a handful starting with the letters 'F' and 'S' and two starting with the today's letter, the letter 'N'. During his career as an attack and penetration specialist, Mr Long has performed active network and physical security assessments (one in the cube is worth twenty on the net) for hundreds of government and commercial clients. Johnny Long is the Author of 'Penetration Testing with Google', available December 2004 from Syngress Publishing"

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about! But wait, there's more! Act now and Johnny will throw in the all new "Google Hacking Victim Showcase, 2005" loaded with tons of screenshots (and supporting queries) of some of the most unfortunate victims of this fun, addictive and deadly form of Internet nastiness. Think you're too uber to be caught in a Google talk? Fine. Prove your badness. Win the respect of the audience by crushing the live Google Hacking contest! Submit your unique winning query by the end of the talk to win free books from Syngress Publishing and other cool gear! Or don't. Just listen to your friends rave about it. Whatever. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises ("Yarrrrr!"), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including "Google Hacking for Penetration Testers" from Syngress Publishing, which has secured rave reviews and has lots of pictures.

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them bypassed), and learn all about using Google to locate targets Google doesn't even know about! But wait, there's more! Act now and Johnny will throw in the all new "Google Hacking Victim Showcase, 2005" loaded with tons of screenshots (and supporting queries) of some of the most unfortunate victims of this fun, addictive and deadly form of Internet nastiness. Think you're too uber to be caught in a Google talk? Fine. Prove your badness. Win the respect of the audience by crushing the live Google Hacking contest! Submit your unique winning query by the end of the talk to win free books from Syngress Publishing and other cool gear! Or don't. Just listen to your friends rave about it. Whatever. Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises ("Yarrrrr!"), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including "Google Hacking for Penetration Testers" from Syngress Publishing, which has secured rave reviews and has lots of pictures.