Hurricane Labs offentlig
[search 0]
Mer

Download the App!

show episodes
 
Loading …
show series
 
The Hurricane Labs team shares a few stories about their experiences with social engineering–and ways we can become more resilient to this type of attack. Also, make sure to check out some of the articles and resources mentioned during this episode: Verizon 2021 Data Breach Investigations Report Influence: The Psychology of Persuasion RSA Key Extra…
 
Two of Hurricane Labs' team members red teamed for the NECCDC in March. They share insight to some of the strategies they used in their role as attackers. Also, make sure to check out some of the articles and resources mentioned during this episode: Northeast Regional of the Collegiate Cyber Defense Competition (NECCDC) NECCDC Red Team Review NECCD…
 
In this follow-up podcast, Heather chats with Hurricane Labs’ Director of Security Operations about further security implications of the Russia-Ukraine conflict. Also, make sure to check out some of the articles and resources mentioned during this episode: SOC Talk: The Russia-Ukraine Crisis, Part 1 Statement by President Biden on our Nation's Cybe…
 
In this podcast, Heather chats with two members of the Hurricane Labs SOC team about distributed denial of service (DDoS) attacks as well as how to identify, prevent, and mitigate these attacks. Also, make sure to check out some of the articles and resources mentioned during this episode: IT-ISAC GreyNoise Hurricane Labs Security Services Have ques…
 
In this special release podcast, Hurricane Labs' Director of Security Operations and our Director of Splunk Operations discuss the security implications of the Russia-Ukraine conflict. Also, make sure to check out some of the articles and resources mentioned during this episode: CISA Alert (AA22-047A) Second Wiper Attack Strikes Systems in Ukraine …
 
In this podcast, Heather chats with the Hurricane Labs' SOC team about their favorite OSINT tools. Also, make sure to check out some of the articles and resources mentioned during this episode: Atomic Red Team Bitwarden CyberChef CyberChef for Splunk DNSdumpster Emailrep.io Machinae Ninoseki Privacy Tools Spiderfoot Splunk Attack Range Click here f…
 
In this podcast, Heather and Roxy talk about the malware-laced USB devices being mailed to companies recently–and how you can stay safe. Also, make sure to check out some of the articles and resources mentioned during this episode: CISA: Using Caution with USB Drives FBI warns cybercriminals have tried to hack US firms by mailing malicious USB driv…
 
In part two of this series, Heather chats with some of Hurricane Labs' security analysts about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Log4j: Letting the JNDI out of the bottle blog post by Tony Robinson 6 Practical Fraud Prevention Tips blog post by Roxy FTC warns …
 
In part one of this two-part series, Heather chats with two of Hurricane Labs' pentesters about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Log4Shell Everywhere Log4Shell Detection with ZAP Two Nmap NSE scripts: NSE Log4Shell Other NSE Hurricane Labs' SOC Talk: IoT and …
 
In this podcast, Heather chats with Tony, Kurt, and Josh about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Actual CVE-2021-44228 payloads captured in the wild Log4j – Apache Log4j Security Vulnerabilities Log4Shell Hell: anatomy of an exploit outbreak Splunk Security Ad…
 
In today's podcast, Heather chats with Hurricane Labs pentester Meredith about what the infosec community thinks of Apple's recent 0day disclosure troubles. Also, make sure to check out some of the articles mentioned during this episode: About the security content of iOS 12.5.5 Apple Releases Security Updates Pentest Stories: Responsible vulnerabil…
 
In this podcast, Heather speaks with two of Hurricane Labs' Splunkers about machine learning's potential when paired with Splunk. Related articles: Exploratory Data Analysis for Anomaly Detection – Splunk Blogs Cyclical Statistical Forecasts and Anomalies – Splunk Blogs Welcome to the Machine Learning Toolkit – Splunk Docs Machine Learning Crash Co…
 
In this podcast, Heather chats with members of Hurricane Labs' team about navigating security and IoT devices. Also, make sure to check out some of the resources mentioned during this episode: CloudFree – Smart Home Devices Home Assistant – Open Source Home Automation California Passes Law That Bans Default Passwords in Connected Devices – TechCrun…
 
In this podcast, Heather talks with two of Hurricane Labs' pentesters about how they approach attacking a network and an application. If you're looking to get started with pentesting–or want to improve your skills–participating in CTFs is a great way to do that. Check out Roxy's informational blog-video combination to get a head start on setting up…
 
In this podcast, Heather invites Hurricane Labs' team members Tom, Roxy, and Dusty to discuss the cybersecurity skills gap–and what both security professionals as well as learners can do to address the associated challenges. During the episode, Tom mentions the Global Collegiate Penetration Testing Competition (CPTC)–Tom has been involved in CPTC s…
 
On today’s show, Heather Terry chats with Steve McMaster, Brian Karrigan, Dusty Miller, and Austin O'Neil as they wrap up their discussion on designing a security operations center (SOC). In case you missed it, make sure to listen to Designing a SOC: Internal or External? Part 1. Click here for our podcast episode transcript.…
 
On today’s show, Heather Terry welcomes a few members of the Hurricane Labs’ team–Steve McMaster, Brian Karrigan, Dusty Miller, and Austin O'Neil–to discuss the steps that go into establishing a SOC team, and what you'll want to consider when deciding whether your team will be internal or whether you'll work with a Managed Security Services Provide…
 
In this podcast, Heather chats with Vulnerability Management Specialist Roxy and SOC Analyst Dusty about the security best practices concerns at play in the recent water plant breach. Related articles: Florida Water Plant Hack: Leaked Credentials Found in Breach Database Breached water plant employees used the same TeamViewer password and no firewa…
 
Curious about the Collegiate Penetration Testing Competition (CPTC)? In this podcast, Heather welcomes Tom Kopchak, Josh Neubecker, and Meredith Kasper to chat about their experiences working to bring the competition to life. Learn more about CPTC from Tom's blog posts and by visiting the CPTC website and Twitter profile: CPTC Review Part 1: The Se…
 
In this podcast, Heather chats with Roxy, our Vulnerability Management Specialist, and Bill Mathews, our Chief Technical Officer and owner of Hurricane Labs, about preparing vulnerability management policies. Be sure you check out some of the related resources mentioned during this episode: How to Write a Vulnerability Management Policy by Roxy NIS…
 
In this podcast, Heather welcomes Senior SOC Analyst Tony Robinson back for a follow-up discussion about the FireEye and SolarWinds breaches. Related resources: FireEye and SolarWinds Breaches Q&A with Senior SOC Analyst Tony Robinson by Heather Terry Security Advisory Regarding SolarWinds Supply Chain Compromise by Tony Robinson Security Advisory …
 
In this podcast, Heather welcomes Senior SOC Analyst Tony Robinson to talk about the FireEye and SolarWinds breaches in a Q&A. Be sure you check out some of the related resources mentioned during this episode: Security Advisory Regarding SolarWinds Supply Chain Compromise by Tony Robinson Security Advisory Regarding the Recent FireEye Breach Report…
 
In part 2 of this podcast series, Heather Terry welcomes members of the Hurricane Labs SOC team, Brian Karrigan, Kurt Wolfe, and Meredith Kasper, to continue the discussion about the MITRE ATT&CK framework. This episode provides a few more details about what setting up the framework is like and what our team is excited about with MITRE as we move f…
 
On today's show, Heather Terry welcomes Bill Mathews, Hurricane Labs' Owner and CTO, and Josh Silvestro, Hurricane Labs' SOC Tier II Team Lead, to discuss the MITRE ATT&CK framework. This conversation provides insight into what the framework is and its value to security teams. Also, make sure you check out some of the related resources mentioned du…
 
On today’s show, Heather Terry welcomes three members of the Hurricane Labs' SOC (security operations center) team to share a bit about their career journeys, to answer some of the infosec questions we’ve been asked via social media, and to talk about how they deal with burnout. Also, make sure to check out some of the resources mentioned during th…
 
In this podcast, Hurricane Labs Technical Writer Heather Terry, and VIP guest Hurricane Labs Director of Marketing Kelsey Clark, raise a toast to the Women in Tech 24-hour Virtual World Tour and chat about the highlights of their experience. Thanks for tuning in. Cheers! Also, make sure you check out some of the fabulous resources we mention on the…
 
Welcome back to the Hurricane Labs Podcast for Splunk! Your podcast hosts on this episode are Kelsey, Tom, and Brian (somehow all of us are apparently very broken, but we've still managed to get a few thoughts out about Splunk). In this episode we will be discussing quite a few topics, including: [0:00 - 0:36 seconds] Time dedicated to our absolute…
 
duh duh duhhhh the INTERNET OF THINGS *said in a loud, obnoxious wrestling announcer style voice* Podcast Topic (aka rant): On this episode Kelsey, Josh, Rob and Tim will be chatting (and yelling) about the Internet of Things... Kelsey's Disclaimer: Kelsey personally apologizes for any vulgar language that may occur during the podcast XD Are you as…
 
Hey Splunkers, it's been a while, but we're back! This is the Hurricane Labs Podcast for Splunk: Third Edition, and we're going to call this the "It's not magic, it's Splunk" segment. Your hosts on this podcast are Kelsey (marketing person who no longer wants to host this particular podcast), Steve (SOC department lead), Tom (Splunk admin departmen…
 
(...but really). Is ransomware the biggest threat in cybersecurity right now? Which side of the "to pay, or not to pay" argument do we land on? What does the future of ransomware look like? How do enterprises and users avoid this malicious software that locks down their critical business data? These and other questions (that are less ridiculous tha…
 
Our big topic of discussion is Splunk Cloud - the good, the bad, and the ugly; we also cover some of the interesting features of Enterprise Security 4.0, including some things about Tim's favorite new feature; Cameron (CAMRON!) has *** Cameron's "Rant Sesh" Section***; Kelsey gets fired; and basically we have lots of opinions (as per usual) and a f…
 
So, what's really going on with the Apple-FBI encryption debate and what are the major concerns surrounding it? Also, did you hear about that hospital that was hit by ransomware? Interested in some "official" Hurricane Labs tips on how you can avoid this type of attack? Listen in! This is Hurricane Labs' InfoSec Podcast Episode .08: The "No, You Ca…
 
What can, or should, the Internet and Social Media companies do to fight terrorism? How do we wade through the murkiness of cyber defense and offense when it comes to war? What happened with the DDoS attack on the Internet's backbone and is it worth worrying about? This is Episode .07: The "Blurred Lines and the Murkiness of Cyberwar" Edition, feat…
 
No, you can't magic data... But we will be talking about some things you can do with Splunk! Welcome to the first edition of the Hurricane Labs Podcast for Splunk, with your hosts Bill (@billford), Tim, Ian (@ianisgood), and Kelsey (@k1clark). Topics of Discussion: Splunk 6.3 Release Overview Release Notes - Welcome to Splunk Enterprise 6.3 Our Spl…
 
This is Episode .06: The "Out of Sight and Beyond Oversight" Edition, featuring Kelsey Clark (Host), Corey Ham (Pen Tester), Tom Kopchak (Senior Security Engineer & Ops Team Lead), and first time podcaster John Haprian (Director of Technical Services). Episode .06 topics of discussion include: EMV stuff, Volkswagen probs, something about 'Whammies,…
 
This is Episode .05: The "Oh, so life really does have consequences..." Edition, featuring Kelsey Clark (Marketing Person), Corey Ham (Pen Tester), Tom Kopchak (Senior Security Engineer & Ops Team Lead), and Barton Yadlowski (Splunker & Data Scientist). Just a quick show note: Tom references a blog article he wrote a while back during the podcast, …
 
This podcast was recorded by the Hurricane Labs crew, and special guest Wolfgang Goerlich, at the 2015 Converge Conference. Topics of discussion (and witty banter) include: FBI anti-encryption rhetoric; the Hacking Team hack; Google's social responsibility; and more. Converge and BSides Detroit were fantastic - if you didn't get the chance to make …
 
Featured Articles: OPM hack shines light on abysmal state of US federal system's security Why the Federal Government Sucks at Cyber Security NSA Has Reverse-Engineered Popular Consumer Anti-Virus Software In Order To Track Users Google is Worse than the NSA Why It's Worth Divorcing Information Security From IT [Play Episode Below]…
 
The controversial question posed here is: Are airplane hackers good or bad? We decided to highlight this segment from our most recent Podcast: Episode .03 - The "But Wait, Where's the Logjam Logo" Edition, because it's an interesting topic and we didn't want you to miss it due to our full episode being a bit lengthy in time. During this segment, Hu…
 
Welcome back to the Hurricane Labs InfoSec Podcast. This is Episode .03: The "But Wait, Where's the Logjam Logo?" Edition, featuring Kelsey Clark (Marketing Person), Corey Ham (Penetration Tester), Tom Kopchak (Senior Security Engineer & Operations Team Lead), and Amanda Berlin (Network Security Engineer). Listen in to this animated and information…
 
Loading …

Snabbguide

Upphovsrätt 2022 | Sitemap | Integritetspolicy | Användarvillkor
Google login Twitter login Classic login