Podcast Episodes

Back to Search
Pacific Rim - BTS #41

Pacific Rim - BTS #41


Season 1 Episode 41


In this episode, Paul Asadorian, Larry Pesce, and Evan Dornbusch delve into the recent Sophos reports on threat actors, particularly focusing on the Pacific Rim case. They discuss the implications of…


Published on 11 months ago

Backdoors in Backdoors

Backdoors in Backdoors



In this episode, Paul Ascidorian and Matt Johansen discuss the recent targeted attacks by Chinese threat actors, particularly focusing on the Volt Typhoon group. They explore the implications of back…


Published on 11 months, 2 weeks ago

The Art of Firmware Scraping - BTS

The Art of Firmware Scraping - BTS


Episode 39


In this episode, Edwin Shuttleworth from Finite State discusses firmware security, insights from the GRRCON Security Conference, and the challenges of firmware analysis. The conversation covers vario…


Published on 1 year ago

Vulnerability Tracking & Scoring - Patrick Garrity - BTS #38

Vulnerability Tracking & Scoring - Patrick Garrity - BTS #38



In this episode of Below the Surface, host Paul Ascadorian and guest Patrick Garrity discuss the complexities of vulnerability tracking and prioritization. They explore various sources of vulnerabili…


Published on 1 year ago

Firmware Reverse Engineering - Matt Brown - BTS #37

Firmware Reverse Engineering - Matt Brown - BTS #37



In this episode, Matt Brown joins the podcast to talk about firmware reverse engineering and supply chains. They discuss Matt's start in information security, his journey into hardware security, and …


Published on 1 year ago

Supply Chain Policies - Trey Herr, Stewart Scott - BTS #36

Supply Chain Policies - Trey Herr, Stewart Scott - BTS #36



Stewart and Trey join us to talk about driving cybersecurity policies for the nation, what makes a good policy, what makes a bad policy, supply chain research and policies, and overall how we shape p…


Published on 1 year, 1 month ago

The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35

The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35



Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment.

This segmen…


Published on 1 year, 2 months ago

EPSS - The Exploit Prediction Scoring System - Jay Jacobs, Wade Baker - BTS #34

EPSS - The Exploit Prediction Scoring System - Jay Jacobs, Wade Baker - BTS #34



Jay Jacobs Co-Founder and Data Scientist and Wade Baker Co-Founder; Data Storyteller from The Cyentia Institute come on the show to talk about The Exploit Prediction Scoring System (EPSS).

This segme…


Published on 1 year, 2 months ago

Securing OT Environments - Dr. Ed Harris - BTS #33

Securing OT Environments - Dr. Ed Harris - BTS #33



Ed Harris joins us to discuss how to secure OT environments, implement effective air gaps, and more!

This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more a…


Published on 1 year, 3 months ago

Mitre ATT&CK - Adam Pennington - BTS #32

Mitre ATT&CK - Adam Pennington - BTS #32



We discuss the various aspects of Mitre Att&ck, including tools, techniques, supply chain aspects, and more!

This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to lear…


Published on 1 year, 3 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate