Podcast Episodes
Back to Search
Understanding How Data Science Applies to Infosec - Michael Roytman - PSW #675
Michael takes us through some of the common AI and ML methods of data science and how they apply to our InfoSec problems.
This segment is sponsored…
5 years, 4 months ago
Threat Actors & Recent Trends - Jamie Fernandes, Karsten Chearis - PSW #675
Jamie and Karsten join us for a discussion about recent attack trends, threat actors, and campaigns carried out by malicious threat actors. Everythin…
5 years, 4 months ago
Cobalt Strike Leak, DNS Cache Poisoning, & Decrypting Open SSH - PSW #674
In the Security News, not all cyberattacks are created equal, Google patches two more Chrome zero days, What does threat intelligence really mean, Co…
5 years, 4 months ago
Challenges With Securing Container Environments - Badri Raghunathan, Sumedh Thakar - PSW #674
Sumedh and Badri discuss challenges associated with container Security & DevOps need for visibility into containers. Qualys' new approach to runtime …
5 years, 4 months ago
Disrupt Attacks at the Endpoint with Attivo Networks - Joseph Salazar - PSW #674
Attackers have repeatedly demonstrated that they can evade perimeter defenses to compromise a system inside the network. Once they get in, they must …
5 years, 4 months ago
Multiple iOS 0-Days, Intel Malware Defense, & Windows 0-Day Under Attack - PSW #673
In the Security News, Deception Technology: No Longer Only A Fortune 2000 Solution, Windows 10 zero-day could allow hackers to seize control of your …
5 years, 4 months ago
Proactive Security Using Runbooks - Dan DeCloss - PSW #673
Runbooks can be a game changer when it comes to executing proactive security assessments and tabletop exercises. This segment will highlight how to u…
5 years, 5 months ago
Abusing JWT (JSON Web Tokens) - Sven Morgenroth - PSW #673
Learn how JWTs are implemented, both the correct way and the insecure way. Spoiler alert, most implement them insecurely. Sven will also show you som…
5 years, 5 months ago
JavaScript Web Tokens, NVIDIA GeForce Experience Vulns, & Hacking Coffee Pots - PSW #672
In the Security News, the KashmirBlack botnet is behind attacks on CMSs such as WordPress, Joomla, and Drupal, Cybercriminals are Coming After Your C…
5 years, 5 months ago
How Computer Vision Balances Thoroughness & Speed - PSW #672
Polarity uses computer vision that works like augmented reality for your data. It's not a new dashboard to search or a new portal to manage. Polarity…
5 years, 5 months ago