PaulDotCom Security Weekly
PaulDotCom Security Weekly Podcast with Paul, Larry, Mick, Carlos, and special guests!
Visit Show Website http://pauldotcom.com/Recently Aired
-
HD
Interview with Winn Schwartau, Preserving Security Research w/ The Calvary - Episode 352 - November 7, 2013
Winn Schwartau is one of the world's top experts on ...
Winn Schwartau is one of the world's top experts on security, privacy, infowar, cyber-terrorism and related topics. He is well known for his appearances at DEFCON as the host for the game Hacker Jeopardy.
-
HD
Somebody's Watching: The Future of Privacy - Episode 350, Part 6 - October 25, 2013
Robert Graham is the co-founder and CTO of Errata Security, ...
Robert Graham is the co-founder and CTO of Errata Security, a firm specializing in cybersecurity consulting and product verification. Mr. Graham learned hacking as a toddler from his grandfather, a World War II codebreaker. His first IDS was written...
-
HD
Military Veterans in Information Security - Episode 350, Part 5 - October 25, 2013
Nik Seetharaman is a consultant for a government client in ...
Nik Seetharaman is a consultant for a government client in the DC area. He spent 11 years in the United States Air Force where he served in the intelligence and joint special operations communities. Nate Kenyon (@L2Nate) spent 5 years in the Marine...
-
HD
Interview with Jayson Street, Interview with Kevin Finisterre - Episode 350, Part 4 - October 25, 2013
Jayson E. Street is an author of “Dissecting the hack: ...
Jayson E. Street is an author of “Dissecting the hack: The F0rb1dd3n Network” from Syngress. He has also spoken at DEFCON, DerbyCon, UCON and at several other ‘CONs and colleges on a variety of Information Security subjects. His life story can...
-
HD
Java Whitelisting, Honeynet Project, HTTP Comments Displayer - Episode 350, Part 3 - October 25, 2013
As with most sizable organizations it is near impossible to ...
As with most sizable organizations it is near impossible to uninstall or completely disable Java which sent us on a hunt for a feasible way to contain Java based attacks. What we came up with was restricting it to run only in trusted zones. This...
-
HD
SCADA: Attack & Defense: Securing Critical Infrastructure - Episode 350, Part 2 - October 25, 2013
SCADA systems are being attacked and making headlines. However, this ...
SCADA systems are being attacked and making headlines. However, this is not news, or is it? There is a lot of new found "buzz" around attacking SCADA and defending SCADA. Technology has evolved and many systems are Internet connected and more advanced...
-
HD
Support Wounded Warriors, Active Defense: Taking The Fight To Attackers: Should We? - Episode 350, Part 1 - October 25, 2013
Welcome to our very special episode 350! We have a ...
Welcome to our very special episode 350! We have a very special episode, all in support of wounded veterans in our armed services. Please take the time to donate using the links above. We've got an epic day in store for you, including contests, panel...
-
HD
HP Protect Interviews - Episode 349 - October 17, 2013
As the Security Weekly crew gears up for the Episode ...
As the Security Weekly crew gears up for the Episode 350 marathon for our charity Wings for Warriors next week on October 25th, enjoy this episode featuring pre-recorded interviews from HP Protect.
-
HD
Heather Mahalik on Smartphone Forensics Course, Drunken Security News - Episode 348 - October 10, 2013
This segment was broken in two parts as the technical ...
This segment was broken in two parts as the technical segment with Heather Mahalik happened in the middle of it. Heather is a senior digital forensics analyst at Basis Technology. As the on-site project manager, she uses her experience to manage the...
-
HD
Interview with Thierry Zoller - Episode 348 - October 10, 2013
Thierry has 14 years experience in information security, designing resistant ...
Thierry has 14 years experience in information security, designing resistant architectures and systems, managing development and information security teams, ISM policies and high profile penetration tests. Thierry has a security blog over at...