Podcast Episodes

Back to Search
Understanding How Data Science Applies to Infosec - Michael Roytman - PSW #675
Understanding How Data Science Applies to Infosec - Michael Roytman - PSW #675

Michael takes us through some of the common AI and ML methods of data science and how they apply to our InfoSec problems.

 

This segment is sponsored…

5 years, 4 months ago

Short Long
View Episode
Threat Actors & Recent Trends - Jamie Fernandes, Karsten Chearis - PSW #675
Threat Actors & Recent Trends - Jamie Fernandes, Karsten Chearis - PSW #675

Jamie and Karsten join us for a discussion about recent attack trends, threat actors, and campaigns carried out by malicious threat actors. Everythin…

5 years, 4 months ago

Short Long
View Episode
Cobalt Strike Leak, DNS Cache Poisoning, & Decrypting Open SSH - PSW #674
Cobalt Strike Leak, DNS Cache Poisoning, & Decrypting Open SSH - PSW #674

In the Security News, not all cyberattacks are created equal, Google patches two more Chrome zero days, What does threat intelligence really mean, Co…

5 years, 4 months ago

Short Long
View Episode
Challenges With Securing Container Environments - Badri Raghunathan, Sumedh Thakar - PSW #674
Challenges With Securing Container Environments - Badri Raghunathan, Sumedh Thakar - PSW #674

Sumedh and Badri discuss challenges associated with container Security & DevOps need for visibility into containers. Qualys' new approach to runtime …

5 years, 4 months ago

Short Long
View Episode
Disrupt Attacks at the Endpoint with Attivo Networks - Joseph Salazar - PSW #674
Disrupt Attacks at the Endpoint with Attivo Networks - Joseph Salazar - PSW #674

Attackers have repeatedly demonstrated that they can evade perimeter defenses to compromise a system inside the network. Once they get in, they must …

5 years, 4 months ago

Short Long
View Episode
Multiple iOS 0-Days, Intel Malware Defense, & Windows 0-Day Under Attack - PSW #673
Multiple iOS 0-Days, Intel Malware Defense, & Windows 0-Day Under Attack - PSW #673

In the Security News, Deception Technology: No Longer Only A Fortune 2000 Solution, Windows 10 zero-day could allow hackers to seize control of your …

5 years, 4 months ago

Short Long
View Episode
Proactive Security Using Runbooks - Dan DeCloss - PSW #673
Proactive Security Using Runbooks - Dan DeCloss - PSW #673

Runbooks can be a game changer when it comes to executing proactive security assessments and tabletop exercises. This segment will highlight how to u…

5 years, 5 months ago

Short Long
View Episode
Abusing JWT (JSON Web Tokens) - Sven Morgenroth - PSW #673
Abusing JWT (JSON Web Tokens) - Sven Morgenroth - PSW #673

Learn how JWTs are implemented, both the correct way and the insecure way. Spoiler alert, most implement them insecurely. Sven will also show you som…

5 years, 5 months ago

Short Long
View Episode
JavaScript Web Tokens, NVIDIA GeForce Experience Vulns, & Hacking Coffee Pots - PSW #672
JavaScript Web Tokens, NVIDIA GeForce Experience Vulns, & Hacking Coffee Pots - PSW #672

In the Security News, the KashmirBlack botnet is behind attacks on CMSs such as WordPress, Joomla, and Drupal, Cybercriminals are Coming After Your C…

5 years, 5 months ago

Short Long
View Episode
How Computer Vision Balances Thoroughness & Speed - PSW #672
How Computer Vision Balances Thoroughness & Speed - PSW #672

Polarity uses computer vision that works like augmented reality for your data. It's not a new dashboard to search or a new portal to manage. Polarity…

5 years, 5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us