Category Archives: Internet Of Things

Podcast: Jeff Reed

kiqOBkL__400x400

Jeff Reed

Jeff Reed is Senior Vice President of Product for Cisco’s Security Business. He oversees product management, customer success and technical marketing for the industry’s leading security portfolio.

cisco-logo

I interviewed Jeff at the RSA Security Conference in San Francisco earlier this year and we discussed what’s new with CISCO including their recent acquisition of Duo Security, 2FA, cloud security, zero trust, how Jeff got into security, and his prediction on when we can expect the robot apocalypse.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

 

 

Tagged , , , , , , , , , , , , ,

PODCAST: Sivan Rauscher

Sivan-edit

Sivan Rauscher

Sivan Rauscher is the Co-Founder and CEO of SAM Seamless Network. Previously, Sivan worked at Comsec Global, overseeing cyber projects and high-level strategic consulting in Israel and Europe. Prior to Comsec Global, she served as a Captain and project manager in the Israeli Intelligence Corps. Sivan holds a master’s degree from the Interdisciplinary Center in Herzliya.

In this interview we discuss Sivan’s experience in the Israeli Intelligence Corps, her work at SAM Seamless Network, securing IoT devices at home, artificial intelligence, the future of cybersecurity and more!

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

SAM-seamless-net

Check out SAM Seamless Network’s website for more info.

Tagged , , , , , , , , , , , , , , , , , , , ,

PODCAST: Amazon Key & HID Attacks with MG

WiRPfsLy_400x400

Guest: MG

This episode’s guest is Bay Area based security researcher MG. He joins the podcast to share his work experimenting with various HID (Human Interface Devices) attacks using USB drives and cables. MG has also made news recently for disclosing a vulnerability in the Amazon Key smart lock technology and shares his experience developing the proof of concept and eventually sharing it with Amazon’s security team.

Check out MG’s work here!

Amazon Key Attack

HID attack hardware

All-USB-devices-on-table

USB Rubber Ducky by Hak5

USB-rubber-ducky

MG’s HID attack platform for USB Type-A connectors

USBA-connector

PCB-boardwithUSBAconnector

Smoke-emitting USB drive

Smoke-USB

Exploding USB drive

Apple USB Lightning connector (MG’s HID attack cable on left)

Apple-lightningbolt2

Apple-lightningbolt-1

MG’s HID attack platform for USB Type-C connectors

USBC-connectors

DIRECT DOWNLOAD OF PODCAST MP3

Subscribe on iTunes, GooglePlay and Stitcher!

Tagged , , , , , , , ,

PODCAST: RSA Conference 2017

RSAC2017-Banner

LISTEN TO FULL PODCAST

Another year, another wave of security incidents and threat models to keep the cybersecurity industry busy. So there was plenty to discuss and share as the InfoSec community flocked to San Francisco for the annual RSA Conference last month.

RSAC2017-escalator1

A view from the escalator as I descend into the bowels of RSAC 2017.

As always, the latest trends in the industry were addressed. Large data breaches, quickly growing threat models, security education, political hacking, and the risks posed by the Internet of Things were common threads throughout many of the keynotes, sessions, workshops, expos, and general chatter among attendees.

RSAC has more of a trade show feel compared to other security conferences so I’ve learned over the years that it’s best to approach the conference as an opportunity to meet and network with industry experts. This year I spent less time attending the talks and more time meeting with the players in the industry who are there to make deals and form partnerships.

However, I did catch several enlightening talks and panel discussions featuring the likes of ex-CIA operative Valerie Plame, security guru Bruce Schneier, researcher Rob Graham, people-security expert Masha Sedova, and security consultant Jeff Carr. Also enjoyed the entertaining keynotes by Late Night host Seth Meyers and astrophysicist Neil deGrasse Tyson.

This slideshow requires JavaScript.

CHECK OUT ROB GRAHAM’S TALK ON MIRAI AND IoT BOTNETS HERE!

Throughout the week I was lucky to catch up with several industry professionals representing some of the top tier firms in the cybersecurity sector who shared their take on the challenges and trends facing cybersecurity firms, their clients, and end users.

This episode of the podcast features interviews collected at RSAC 2017.

BIG THANKS TO THE GUESTS ON THIS EPISODE!!

Dave-Lewis-Akamai

Dave Lewis

Dave Lewis – Akamai

rob-graham

Rob Graham – Errata Security

Donald-Meyer

Donald Meyer

Donald Meyer – Check Point Software

Dario

Dario Forte

Dario Forte – DFLabs

Sebastian, Alex and SelenaOnapsis

Scott-Bollinger

Scott Bollinger

Scott Bollinger – Security Researcher

Jeff-Carr

Jeffrey Carr

Jeffrey Carr – 20K League

DOWNLOAD FULL PODCAST MP3

SUBSCRIBE on iTunes, GooglePlay, Stitcher, and Soundcloud!!

1-logo-itunesgoogleplay-logostitcher-logo

Follow on Twitter!

RSAC 2017: Rob Graham on Mirai and IoT Botnets

UPDATED WITH SLIDES (03/15/17)

rob-graham

“Mirai and IoT Botnet Analysis” MP3 AUDIO FILE

RSAC2017-Mirai-OPENINGSLIDE

“Mirai and IoT Botnet Analysis” SLIDES – PDF FILE

At this year’s RSA security conference in San Francisco, researcher Rob Graham gave a presentation entitled “Mirai and IoT Botnet Analysis.” His talk examined the infamous “Mirai” Internet of Things botnet and shared details on how it operates. Graham also covered technical aspects of the cameras it infects and detailed his own experimentation with Mirai in the wild. He went on to discuss last year’s massive DDoS attacks on DNS provider Dyn, which involved variations of the Mirai IoT botnet.

No official AV video recording of this talk, but the audio and RSAC slides are all you need.

Enjoy!

Also, check out Rob’s blog!

-Vince

Follow me on Twitter!

Tagged , , , , , , , , , , ,
%d bloggers like this: