Exploring Information Security - Exploring Information Security-logo

Exploring Information Security - Exploring Information Security

Technology Podcasts

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

Location:

United States

Description:

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

Language:

English


Episodes
Ask host to enable sharing for playback control

How to Harness the Power of pfSense for Network Security

5/7/2024
In this episode of Exploring Information Security, Security Engineer Kyle Goode takes a deep dive into the versatile world of pfSense, a robust open-source firewall and router that has been a mainstay in the network security arena for over two decades. Kyle shares insights from his own experiences with pfSense, exploring both the practical and technical aspects of setting up and managing a pfSense system.

Duration:00:33:32

Ask host to enable sharing for playback control

What are Deepfakes with Dr. Donnie Wendt

4/30/2024
In this enlightening episode of the Exploring Information Security podcast, we dive deep into the world of deepfakes with Dr. Donnie Wendt. With a background in cybersecurity at MasterCard, Dr. Wendt shares his journey into the exploration of deepfake technology, from setting up a home lab using open-source tools to presenting the potential business impacts of deepfakes to leadership teams.

Duration:00:33:02

Ask host to enable sharing for playback control

The Crucial Gap in Control Systems Security: A Deep Dive with Joe Weiss

4/23/2024
In this compelling episode of the Exploring Information Security podcast, we sit down with Joe Weiss, a seasoned expert in control systems security, to unravel the complexities and challenges facing the security of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems today.

Duration:00:35:28

Ask host to enable sharing for playback control

ShowMeCon: Talking PCI 4.0 change with Jeff Man

4/16/2024
Welcome to a special edition of the Exploring Information Security podcast, where we dive into the intricacies of cybersecurity with industry veteran Jeff Man! A distinguished figure in cybersecurity Jeff has a wealth of experience that spans over four decades, including his early years at the National Security Agency and extensive work in the private sector. This podcast sponsored by ShowMeCon.

Duration:00:32:16

Ask host to enable sharing for playback control

ShowMeCon: How AI will impact Cybersecurity Enhancements and Threats with Jayson E. Street

4/9/2024
In this engaging episode Jayson E. Street, a renowned cybersecurity expert, joins me to discuss the return of ShowMeCon, the impact of AI in cybersecurity, and innovative strategies for enhancing security and combating threats. Jayson shares his excitement for ShowMeCon, insights on utilizing AI for security enhancements rather than traditional attacks, and offers practical advice for users, executives, and information security professionals. This podcast sponsored by ShowMeCon.

Duration:00:31:12

Ask host to enable sharing for playback control

ShowMeCon: Azure Vulnerabilities with Scott Miller

4/4/2024
Scott Miller, a fresh voice in the cybersecurity arena, joins me to discuss the intricacies of hacking Azure services. Scott shares his journey from a recent college graduate to becoming a speaker at cybersecurity conferences, along with valuable insights into Azure AD (Active Directory), vulnerabilities within cloud services, and the art of escalation. This episode sponsored by ShowMeCon.

Duration:00:22:04

Ask host to enable sharing for playback control

ShowMeCon: Unraveling the Cybersecurity Fabric of Space and SCADA Networks with Paul Coggin

4/2/2024
In this captivating episode of the "Exploring Information Security" podcast, cybersecurity expert Paul Coggin discusses the intricate world of threat hunting in SCADA networks and the emerging frontier of space cybersecurity. From the inspiration drawn from Transformers movies to the sophisticated attacks like Stuxnet, Coggin delves deep into how monitoring physical indicators could revolutionize our approach to cybersecurity in both terrestrial and extraterrestrial domains. This podcast is sponsored by ShowMeCon.

Duration:00:35:36

Ask host to enable sharing for playback control

ShowMeCon: Talking with the Iceland Viking Arnar

3/26/2024
Arnar is not a speaker this year at ShowMeCon but he will be in attendance. He doesn’t work in the security field but he’s doing some really advanced stuff with cooling in cloud environments. We get into a little bit of everything around what he’s doing as well as talk about AI. Surprise! This podcast is sponsored by ShowMeCon.

Duration:00:29:39

Ask host to enable sharing for playback control

ShowMeCon: Talking Sysmon with Amanda Berlin

3/19/2024
Amanda Berlin is Lead Incident Detection Engineer at Blumira, where she leads the development of new detections for the Blumira platform, based on threat intelligence and research. In this episode I catch up with her to talk about Sysmon and ShowMeCon. Sysmon is such a great tool for getting more information out of your systems. The best part is it’s free. This podcast is sponsored by ShowMeCon.

Duration:00:29:05

Ask host to enable sharing for playback control

ShowMeCon: Couch to Compromise with Johnny Xmas

3/12/2024
Veteran conference speaker Johnny Xmas joins me to discuss ShowMeCon and his talk Couch to Compromise the 2024 edition. His talk is an update from previous years which goes over the latest attacks impacting organizations.

Duration:00:36:35

Ask host to enable sharing for playback control

ShowMeCon: Bypassing MFA with Shameer Amir

3/7/2024
Shameer Amir AKA Titan joins me to discuss his upcoming talk on his research into bypassing multifactor authentication (MFA) at the upcoming ShowMeCon conference. In this episode we talk about a variety of different ways of bypassing MFA from human interaction to more technical interactions with the platforms. A lot of what it comes down to is making sure MFA is setup properly.

Duration:00:20:50

Ask host to enable sharing for playback control

Navigating the Currents of Open Source Intelligence: Insights from the Field

3/5/2024
Micah Hoffman and Griffin Glynn from My OSINT Training join me to talk about the current state of OSINT. Both bring a wealth of knowledge and first meet while working together at the National Child Protection Task Force. They bring a wealth of knowledge and we get into a lot of the ins and outs of OSINT.

Duration:00:43:01

Ask host to enable sharing for playback control

What cybersecurity tools every organization should have

2/27/2024
Rob Fuller AKA Mubix joins me to talk about security tooling every organization should have. This was a result of a discussion Rob and I were having about Thinkst Canary and RunZero. Two fantastic tools that are low cost, easy implementation, and provide a ton of value to a security team.

Duration:00:44:23

Ask host to enable sharing for playback control

ShowMeCon: Bypassing MFA with Brandon Potter

2/22/2024
Brandon Potter joins me to discuss the different ways he’s seeing MFA bypassed as part of his companies work. Attackers are using old and new techniques to discover creative ways to bypass MFA. This is a result of more companies getting onboard with MFA. Unfortunately, that means attackers are going to start to find more ways to bypass MFA. A lot of what Brandon is seeing is coming down to misconfiguration with how MFA is implemented and attackers are starting to use browser in the middle to hijack sessions. Finally, we go over how AI is going to impact MFA.

Duration:00:25:37

Ask host to enable sharing for playback control

What is a Canary?

2/20/2024
Tyron Kemp Presales Engineer at Thinkst Canary joined me to discuss what is a canary. More specifically Thinkst Canaries which is one of the most useful and simple to use tools in the security space. I’m surprised I haven’t heard of more companies using the tool. You drop it in an environment and if you get people scanning or touching it alerts the people that can respond. It’s as simple as that.

Duration:00:27:50

Ask host to enable sharing for playback control

ShowMeCon: Kevin Johnson and whatever he wants to talk about

2/15/2024
Kevin Johnson the Chief Executive Officer of Secure Ideas joined me to discuss ShowMeCon and his keynote presentation on the infosec community rising from the ashes like a phoenix. It’s been a while since I’ve had the opportunity to catch up with Kevin but we got right into it and had a lot of great laughs. It’s a little all over the place with talk about ShowMeCon, reincarnation, and John Wick as a romantic comedy. Also, there is an EXPLICIT tag on this podcast.

Duration:00:27:38

Ask host to enable sharing for playback control

How to implement a DAST

2/13/2024
Frank Catucci CTO & Head of Security Research at Invicti is someone who I go back with many years. We both meet while working for the state of South Carolina. I was happy to see him end up at Invicti because I think they have a great podcast focused primarily on Dynamic Application Security Testing (DAST). We get into a variety of topics in this episode around MoveIT, implementing DAST, APIs, and AI.

Duration:00:50:43

Ask host to enable sharing for playback control

What is Mimikatz?

2/6/2024
Rob Fuller aka Mubix joins me to discuss what is Mimikatz? This came from some research I was doing online about hacker tools. I went to the Mimikatz GitHub repo and was immediately hit with a warning that it was a malicious site. Then I looked at the GitHub page and noticed it hadn’t been updated in years. This lead me to reach out to Hacker Historian Mubix to get the skinny on Mimikatz. He provided some interesting not well known insights that you’ll have to listen to the episode to hear.

Duration:00:30:36

Ask host to enable sharing for playback control

How responding to phishing has changed in the last five years

1/30/2024
Kyle Andrus is a seasoned incident responder for a top 500 company. He’s a regular on the podcast when I need to talk incident response and specifically phishing. I last had him on over five years ago to talk about building a malicious link clicker which I used quite a bit in my day-to-day job. Fast forward several years and things have changed significantly. A lot of the things we used to do no longer make sense because tooling has become much better in the enterprise. A lot of security professionals operate there to respond to phishing emails. While our lives are a littler easier that has led to a new set of threats that the security community hasn’t quite gotten their hands wrapped around the newer problems. Finally, we go over how AI is going to impact phishing. I’m sure that will be a question for more many more podcasts.

Duration:00:50:29

Ask host to enable sharing for playback control

How to hack a satellite

1/23/2024
Tim Fowler is an offensive security person at Black Hills Information Security who also happens to be a space nerd thanks to Paul Coggin. I was sitting at the table with Tim at BSides Nashville when Paul planted the seed of satellite hack. Fast forward several hundred hours later and Tim has put together a lot of content on the topic including training for 2024. He makes a compelling case for why we should care about security in space. Mainly, that it’s the next frontier. After spending over an hour talking to him I completely agree. It’s a path that we’re destined to head and a lot of the big companies are already moving that way. This is also a heavily unexplored space for people looking to get into an emerging field this is it.

Duration:01:14:36