Inside Out Security show

Inside Out Security

Summary: Our podcast takes up the big questions of security, risk, and vulnerabilities. A weekly discussion with experts and the Varonis team.

Podcasts:

 More Sheila FitzPatrick: Data Privacy and the Law | File Type: audio/mpeg | Duration: 00:13:53

In the next part of our discussion, data privacy attorney Sheila FitzPatrick get into the weeds and talks to us about her work in setting up Binding Corporate Rules (BCR) for multinational companies. These are actually the toughest rules of the road for data privacy and security.

 The Case for Giving IT a Raise | File Type: audio/mpeg | Duration: 00:31:31

At the awesome O’Reilly Security Conference, I learned from world-leading security pros about the most serious threats facing IT. Hmm, sounds like that would make a great topic for discussion with the Inside Out Security Show panel – Kilian Englert, Kris Keyser, and Peter TerSteeg.

 DDoS Rhapsody | File Type: audio/mpeg | Duration: 00:24:11

In this episode of the Inside Out Security Show panel – Mike Buckbee and Mike Thompson – shared their thoughts on the latest botnet attack.

 Making Security Great Again! | File Type: audio/mpeg | Duration: 00:18:49

Since October was Cyber Security Awareness month, we decided to look at what’s holding back our efforts to make security—to coin a phrase—“great again”.

 IoT Pen Tester Ken Munro: Probing Wireless Networks (Part 2) | File Type: audio/mpeg | Duration: 00:10:10

We have more Ken Munro in this second part of our podcast. In this segment, Ken tells us how he probes wireless networks for weaknesses and some of the tools he uses.

 When Security Is Low, How Do We Go High? | File Type: audio/mpeg | Duration: 00:25:03

So how low can security go? To start, our music, email, and our new favorite toy, the internet of things(IoT) have been hijacked. What?! Also in our "Thinking Like A Hacker" segment, we try to explain SQL Injection using analogies even a five year old would understand. And our tool this week for Sysadmins - Fiddler, the free web debugging proxy for any browser, system or platform.

 IoT Pen Tester Ken Munro: Security Holes (Part 1) | File Type: audio/mpeg | Duration: 00:09:45

If you want to understand the ways of a pen tester, Ken Munro is a good person to listen to. An info security veteran for over 15 years and founder of UK-based Pen Test Partners, his work in hacking into consumer devices — particularly coffee makers — has earned lots of respect from vendors. He’s […]

 Six Degrees of Kevin Bacon (Security Edition) | File Type: audio/mpeg | Duration: 00:19:16

Since security pertains to everyone, in this episode of the IOSS we challenged ourselves to tie security back to Kevin Bacon. You might have to give us a few passes, but the connection is still strong. Keira Knightley: Earlier this year, a man applied for credit account at Best Buy using Keira Knightley’s driver’s license information. […]

 Attorney and Data Scientist Bennett Borden: Find Insider Threats (Part 2) | File Type: audio/mpeg | Duration: 00:21:27

In this second podcast, Bennett continues where he left off last time. Borden describes his work on developing algorithms to find insider threats based on analyzing content and metadata.

 Attraction of Repulsion (to Ransomware) | File Type: audio/mpeg | Duration: 00:29:21

When it comes to ransomware, we can’t stop talking about it. There’s a wonderful phrase for our syndrome, “the attraction of repulsion,” meaning that something is so awful you can’t stop watching and/or talking about it. How awful has ransomware been? According to the FBI, in the first three months of 2016, ransomware attacks cost their […]

 Attorney and Data Scientist Bennett Borden: Data Analysis Techniques (Part 1) | File Type: audio/mpeg | Duration: 00:12:52

Once we heard Bennett Borden, a partner at the Washington law firm of DrinkerBiddle, speak at the CDO Summit about data science, privacy, and metadata, we knew we had to reengage him to continue the conversation. His bio is quite interesting: in addition to being a litigator, he’s also a data scientist. He’s a sought after speaker on […]

 Chief Data Officer Richard Wendell: Skills to Cultivate (Part 2) | File Type: audio/mpeg | Duration: 00:14:38

In this second podcast, Mr. Wendell continues where he left off last time. He explains the skills you’ll need in order to be an effective Chief Data Officer and we learn more about MIT’s International Society of Chief Data Officers.  

 Bring Your Geek To Court | File Type: audio/mpeg | Duration: 00:28:53

Last week, Alpesh Shah of Presidio joined us to discuss law firms and technology. With big data, ediscovery, the cloud and more, it’s of growing importance that law firms leverage technology so that they can better serve their clients. And in doing so, law firms can spend more time doing “lawyerly things” and, um, more billing. Hallmarks […]

 The Vulnerability of Things | File Type: audio/mpeg | Duration: 00:37:12

We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices – cars, thermostats, kettle and more. We also covered GDPR, Privacy by Design and asked if Ken thinks “The Year of Vulnerabilities” will be hitting […]

 Go Open Source! | File Type: audio/mpeg | Duration: 00:31:08

Whether you’re a proponent of open-source or proprietary software, there’s no doubt that the promise of open-source is exciting for many. For one thing, it’s mostly free. It’s built and maintained by passionate developers who can easily “look under the hood”. The best part is that you’re not married to the vendor. Yes, there are many helpful […]

Comments

Login or signup comment.