Artwork

Innehåll tillhandahållet av Hurricane Labs. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Hurricane Labs eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

But Wait, Where's the Logjam Logo?!

1:05:25
 
Dela
 

Arkiverad serie ("Inaktivt flöde" status)

When? This feed was archived on September 02, 2022 14:28 (1+ y ago). Last successful fetch was on July 30, 2022 07:49 (1+ y ago)

Why? Inaktivt flöde status. Våra servar kunde inte hämta ett giltigt podcast-flöde under en längre period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 210496209 series 2360452
Innehåll tillhandahållet av Hurricane Labs. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Hurricane Labs eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

Welcome back to the Hurricane Labs InfoSec Podcast.

This is Episode .03: The "But Wait, Where's the Logjam Logo?" Edition, featuring Kelsey Clark (Marketing Person), Corey Ham (Penetration Tester), Tom Kopchak (Senior Security Engineer & Operations Team Lead), and Amanda Berlin (Network Security Engineer). Listen in to this animated and informational discussion, for the latest InfoSec Hacks and Headlines, Hot Topic Talk, and What We're Arguing About this week. ANNOUNCEMENTS We are hiring! Looking for your next best IT career move? Apply with us today! Position openings include: Network Security Operations AnalystsSplunk/Big Data AdministratorsSplunk Consultants Ian Gillespie has published the first part of his new blog-screencast tutorial series. So, check it out: Custom Error Viewing in Splunk Part 1: Listening for Search Events Awesome job to Amanda Berlin for being featured in a CSO Online article. See what she has to say on the topic of Social Engineering: Social Engineering: Even Shakespeare understood security's weakest link Have you developed an impressive Splunk app? Enter the Splunk Apptitude App Contest for the chance to gain bragging rights for your innovation, along with some nice pocket change. Enter the Splunk Apptitude App Contest TOP INFOSEC HACKS & HEADLINES HOT OFF THE PRESS Logjam Vulnerability Logjam Encryption Flaw Threatens Secure Communications On Web NSA "Irritant Horn" Hacking Project NSA hijacked app stores to hack phones NetUSB FlawNetUSB flaw leaves 'millions' of routers, IoT devices vulnerable to hacking VENOM Bug The VENOM "virtual machine escape" bug - what you need to know New Google Chrome Extension Google's latest experiment brings new superpowers to Chrome browsers Washington Post HackedWashington Post Hacked by Syrian Electronic Army Uber Plain Text Password Problem Uber in hot water again - this time over plaintext passwords in emails TODAY’S HOT TOPIC TALK Thanks to Logjam, we are diving into the topic of 'Encryption.' During this discussion, we will be talking about tech giants urging the US government to retain strong encryption, how often should things and/or what things should be encrypted, whether or not encryption is going to be dead eventually, and more. Amanda also gives a brief overview of her recent blog post about vsftpd (very secure FTP daemon). If you're interested in finding out more, take a look: Dealing with the Dinosaurs of IT: Setting up vsftpd on Ubuntu Other related articles: Tech Firms, Activists Press US on Encryption When Encrypted Communication Is Not Good Enough6 questions to ask when choosing an encryption solution READY TO ARGUE? Question of the day: Are airplane hackers good or bad? Aviation experts dispute hacker's claim he seized control of airliner mid-flight Corey also suggested a Carnal0wnage article that does a good job describing 'stunt hacking.'Check it out: Let's Call Stunt Hacking What it is, Media Whoring UNTIL NEXT TIME! If you have opinions on airplane hackers, or anything else we've discussed, join our conversation and talk to us on Twitter: @hurricanelabs
  continue reading

54 episoder

Artwork
iconDela
 

Arkiverad serie ("Inaktivt flöde" status)

When? This feed was archived on September 02, 2022 14:28 (1+ y ago). Last successful fetch was on July 30, 2022 07:49 (1+ y ago)

Why? Inaktivt flöde status. Våra servar kunde inte hämta ett giltigt podcast-flöde under en längre period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 210496209 series 2360452
Innehåll tillhandahållet av Hurricane Labs. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Hurricane Labs eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

Welcome back to the Hurricane Labs InfoSec Podcast.

This is Episode .03: The "But Wait, Where's the Logjam Logo?" Edition, featuring Kelsey Clark (Marketing Person), Corey Ham (Penetration Tester), Tom Kopchak (Senior Security Engineer & Operations Team Lead), and Amanda Berlin (Network Security Engineer). Listen in to this animated and informational discussion, for the latest InfoSec Hacks and Headlines, Hot Topic Talk, and What We're Arguing About this week. ANNOUNCEMENTS We are hiring! Looking for your next best IT career move? Apply with us today! Position openings include: Network Security Operations AnalystsSplunk/Big Data AdministratorsSplunk Consultants Ian Gillespie has published the first part of his new blog-screencast tutorial series. So, check it out: Custom Error Viewing in Splunk Part 1: Listening for Search Events Awesome job to Amanda Berlin for being featured in a CSO Online article. See what she has to say on the topic of Social Engineering: Social Engineering: Even Shakespeare understood security's weakest link Have you developed an impressive Splunk app? Enter the Splunk Apptitude App Contest for the chance to gain bragging rights for your innovation, along with some nice pocket change. Enter the Splunk Apptitude App Contest TOP INFOSEC HACKS & HEADLINES HOT OFF THE PRESS Logjam Vulnerability Logjam Encryption Flaw Threatens Secure Communications On Web NSA "Irritant Horn" Hacking Project NSA hijacked app stores to hack phones NetUSB FlawNetUSB flaw leaves 'millions' of routers, IoT devices vulnerable to hacking VENOM Bug The VENOM "virtual machine escape" bug - what you need to know New Google Chrome Extension Google's latest experiment brings new superpowers to Chrome browsers Washington Post HackedWashington Post Hacked by Syrian Electronic Army Uber Plain Text Password Problem Uber in hot water again - this time over plaintext passwords in emails TODAY’S HOT TOPIC TALK Thanks to Logjam, we are diving into the topic of 'Encryption.' During this discussion, we will be talking about tech giants urging the US government to retain strong encryption, how often should things and/or what things should be encrypted, whether or not encryption is going to be dead eventually, and more. Amanda also gives a brief overview of her recent blog post about vsftpd (very secure FTP daemon). If you're interested in finding out more, take a look: Dealing with the Dinosaurs of IT: Setting up vsftpd on Ubuntu Other related articles: Tech Firms, Activists Press US on Encryption When Encrypted Communication Is Not Good Enough6 questions to ask when choosing an encryption solution READY TO ARGUE? Question of the day: Are airplane hackers good or bad? Aviation experts dispute hacker's claim he seized control of airliner mid-flight Corey also suggested a Carnal0wnage article that does a good job describing 'stunt hacking.'Check it out: Let's Call Stunt Hacking What it is, Media Whoring UNTIL NEXT TIME! If you have opinions on airplane hackers, or anything else we've discussed, join our conversation and talk to us on Twitter: @hurricanelabs
  continue reading

54 episoder

Alla avsnitt

×
 
Loading …

Välkommen till Player FM

Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.

 

Snabbguide