Tag Archives: Security Research

Podcast: Malcolm Harkins

Malcom-Harkins-Twitter

Malcolm Harkins

Malcolm Harkins is the Chief Security and Trust Officer at Cylance Inc. He oversees information technology, information risk and security, as well as security and privacy policy. Harkins is also responsible for peer out reach activities to drive improvement across the world in the understanding of cyber-risks as well as best practices to manage and mitigate those risks. Previously Harkins was Vice President and Chief Security and Privacy Officer (CSPO) at Intel Corporation.

DIRECT DOWNLOAD OF PODCAST MP3 FILE

Subscribe on iTunes, GooglePlay and Stitcher!

Check out Malcolm’s talks at RSAC

Malcolm on panel at RSAC 2018:

Tagged , , , , , , ,

PODCAST: Giovanni Vigna

giovanni_vigna_square

Giovanni Vigna

Giovanni is a co-founder and CTO of Lastline, Inc., a company which develops solutions to detect and mitigate advanced malware and targeted threats. He is a Professor in the Department of Computer Science at the University of California in Santa Barbara and director of the Center for CyberSecurity at UCSB. He is co-director of the Security Lab, which is part of the iSeclab group and founder of the Shellphish hacker group which has annually competed in the DEFCON CTF (won in 2005) and also The DARPA Cyber Grand Challenge (3rd place). He also organizes the International Capture The Flag (iCTF), one of the world’s largest attack-defense hacking competitions.

Giovanni’s research focuses on vulnerability analysis, web security, malware analysis, and mobile security. We met in San Francisco at RSAC 2018 this year where he presented two talks, one entitled How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days and also The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem.

This episode we discuss all these things plus GDPR, Santa Barbara hot springs and more!

DIRECT DOWNLOAD OF PODCAST MP3 FILE

Subscribe on iTunes, GooglePlay and Stitcher!

Check out Giovanni at RSAC 2018:

How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days

The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem

 

Tagged , , , , , , , , , , , , , , , , , , , , , ,

PODCAST: RSAC 2018 – Joe Gray

Joe-Gray

Guest Joe Gray

My guest this episode is social engineering guru Joe Gray. Joe is a Senior Security Architect at IBM and has his own blog and podcast called Advanced Persistent Security. Joe presented a talk at RSA this year with friend of the show Rachel Tobac on social engineering and OSINT which I posted the full audio of here. Joe spoke with me about Social Engineering, OSINT, vishing, SECTFs, password inspections and more!

DbKQ-n_U8AA4xcm

DIRECT DOWNLOAD OF PODCAST MP3 FILE

Subscribe on iTunes, GooglePlay and Stitcher!!

 

Tagged , , , , , , , , , , , , , , , , , , ,

RSA Security Thunderdome Debate

As the glory of 2016 rolls to an end, I plan to empty my archive of some unreleased recordings which never made it on to any podcasts over the past year.

rsa-2016

I’m starting with this recording from the RSA Conference earlier this year in San Francisco, CA. It features Jen Ellis of Rapid7 moderating a “Security Thunderdome” debate between Rob Graham (Errata Security) and Josh Corman (Atlantic Council). It’s basically a debate about debating. A very spirited breakdown of the anatomy of a debate with a focus on cyber security.

The audio quality isn’t the best, but good enough to follow along. If you listen closely you’ll hear me ask a question from the audience toward the end. Big thanks to RSA, Jen, Rob, and Josh for allowing me to record the session. I hope this “Thunderdome Debate” format will return next year to RSA and possibly expand to at least another hour. Enjoy!

DIRECT DOWNLOAD OF MP3

 

 

 

Tagged , , , , , , , , ,