September 13, 2022

BSW #276 – Karl Triebes

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:35 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no BSW #276 – Karl Triebes Tue, 13 Sep 2022 23:29:42 +0000 01:06:51 false Podcast full Read more

BSW #276 – Karl Triebes

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:35 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no BSW #276 – Karl Triebes Tue, 13 Sep 2022 23:29:42 +0000 01:06:51 false Podcast full Read more

BSW #276 – Karl Triebes

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:35 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no BSW #276 – Karl Triebes Tue, 13 Sep 2022 23:29:42 +0000 01:06:51 false Podcast full Read more

SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:33 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok Tue, 13 Sep 2022 22:48:08 +0000 27:25 false Podcast …

SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok Read More »

SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:33 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok Tue, 13 Sep 2022 22:48:08 +0000 27:25 false Podcast …

SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok Read More »

SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:33 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok Tue, 13 Sep 2022 22:48:08 +0000 27:25 false Podcast …

SWN #238 – Steam, VMWare, Intel,HP, Apple, Craiglist killing, Meta, & Tiktok Read More »

ASW #211 – Sonali Shah

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:30 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no ASW #211 – Sonali Shah Tue, 13 Sep 2022 18:26:23 +0000 01:17:34 false Podcast full Read more

ASW #211 – Sonali Shah

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:30 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no ASW #211 – Sonali Shah Tue, 13 Sep 2022 18:26:23 +0000 01:17:34 false Podcast full Read more

ASW #211 – Sonali Shah

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:52:30 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no ASW #211 – Sonali Shah Tue, 13 Sep 2022 18:26:23 +0000 01:17:34 false Podcast full Read more

Cyber Security Sauna podcast – Matthew Rosenquist on why value is the cybersecurity blind spot

I had a great time talking with Mark Fletcher in the Cyber Security Sauna podcast, talking about why Value is the blind spot of cybersecurity and how we should maximize it! Fun fact: we recorded this podcast in an actual sauna recording booth at SPHERE22, the world’s first co-security unconference!     LISTEN TO THE PODCAST: …

Cyber Security Sauna podcast – Matthew Rosenquist on why value is the cybersecurity blind spot Read More »

LockBit 3.0 RaaS Gang Incorporates BlackMatter Capabilities

The LockBit 3.0 Ransomware as a Service (RaaS) gang has incorporated BlackMatter capabilities into its operations. LockBit Brings BlackMatter Bits Aboard Researchers at Trend Micro detected several similarities between LockBit 3.0 and BlackMatter. These commonalities were especially evident in the following areas: Privilege escalation – This involves the abuse of native functionality and/or weaknesses to …

LockBit 3.0 RaaS Gang Incorporates BlackMatter Capabilities Read More »

data masking

What is data masking? Data masking is a method of creating a structurally similar but inauthentic version of an organization’s data that can be used for purposes such as software testing and user training. The purpose is to protect the actual data while having a functional substitute for occasions when the real data is not …

data masking Read More »

135 is the new 445

If it was possible to nominate a command-line utility for an award, PsExec would definitively win the most useful category. This tool allows administrators to run remote commands as if they were on the local computer. But unfortunately, not only network administrators love this tool, so do hackers. Sysinternals 101 Windows Sysinternals is a suite …

135 is the new 445 Read More »

R&D Security Report

Research and Development (R&D) is a vital part of business for many companies and a significant proportion of the GDP of leading global economies. Advanced R&D provides an attractive target for a wide range of attackers seeking to steal the “crown jewels” of intellectual property. R&D activities often involve trying out new technologies. Supply chain …

R&D Security Report Read More »

Retail’s False Dilemma: Either Secure the Digital Supply Chain or Improve the Customer Experience

By Source Defense Another holiday shopping season is fast approaching, and the retail industry is rushing to ensure the massive investments they made during the COVID-19 pandemic to better serve customers online are ready to haul in the revenue. But a different haul—a customer data haul—will almost certainly happen if retailers continue to deceive themselves …

Retail’s False Dilemma: Either Secure the Digital Supply Chain or Improve the Customer Experience Read More »

Das Geheimnis des (Test)Erfolgs

Seit mehr als fünf Jahren belegt die G DATA Mobile Security Android bei AV-Test immer einen Spitzenplatz. Seit drei Jahren sogar stets mit der Höchstpunktzahl. Zeit, um mit dem Team über das Geheimnis des Serien-Erfolgs zu sprechen.       Read more

Transform Data into Actionable Insights to Empower Digital Experiences

Today we are living and working in a world that is digital-first and hybrid by design, with cloud, SaaS and legacy technologies working together, and employees working from everywhere. In this world, a click is everything. That action comes with intent and expectation—of a flawless digital experience. These experiences are the heartbeat of the fierce …

Transform Data into Actionable Insights to Empower Digital Experiences Read More »

Transform Data into Actionable Insights to Empower Digital Experiences

Today we are living and working in a world that is digital-first and hybrid by design, with cloud, SaaS and legacy technologies working together, and employees working from everywhere. In this world, a click is everything. That action comes with intent and expectation—of a flawless digital experience. These experiences are the heartbeat of the fierce …

Transform Data into Actionable Insights to Empower Digital Experiences Read More »

Is It Time to Rethink Your Network and Application Performance Management Strategy?

According to Enterprise Management Associates’ latest biannual “Network Management Megatrends” report, nearly 53 percent of respondents are investing in network performance management tool upgrades and enhancements. As digital transformations involving software-defined networking (SDN), cloud migrations, co-location additions, and adoption of software-as-a-service (SaaS) and unified communications as a service (UCaaS) applications have increased, the complexity of …

Is It Time to Rethink Your Network and Application Performance Management Strategy? Read More »

How Defence in Depth Can Help Organisations Tackle Complex Cyber Security Risks

The war against cyber crime has, for some time, been a losing battle. Organisations are reporting record numbers of data breaches, while the costs associated with those incidents continue to spiral. According to Cisco’s 2022 Cybersecurity Almanac, the amount of money organisations spend recovering from cyber attacks is expected to increase by 75% in the …

How Defence in Depth Can Help Organisations Tackle Complex Cyber Security Risks Read More »