

Incident Response Stories - Bill Swearingen - PSW #793
Aug 3, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103
Introduction
00:00 • 2min
Paul Acidorian's Security Weekly: Episode 792
02:07 • 2min
How to Be a Black Hat at Defcon
03:41 • 2min
The Importance of Being Nice
05:23 • 2min
The Rise and Fall of I-Hacked
07:04 • 3min
The Pain of Keeping a Website Running
09:57 • 2min
The Midlife Crisis
11:30 • 2min
The Last Hardware Project I Did Was a Tron Suit
13:11 • 2min
The Importance of Being a Partner
14:51 • 2min
The Importance of Having No Office Furniture
17:12 • 1min
The Role of Third Parties in Account Payable Accounting
18:42 • 2min
The Importance of Security in Relationships
20:23 • 2min
How to Choose the Right Security Provider for Your Business
22:43 • 2min
The Importance of Ongoing Security Monitoring
24:40 • 2min
How to Monetize Your Business With VPNs
26:28 • 1min
How to Setup a Security Group for a Small Business
27:57 • 2min
The Different Types of Companies I Work With
30:09 • 2min
The Importance of Security in the Workplace
32:02 • 2min
The Importance of NIST Certification for Small Companies
33:41 • 2min
How to Send NIST or PCI Bill to a Small Business
35:25 • 2min
How to Write a Book About Manufacturing
36:56 • 2min
The Stages of Incident Response
39:10 • 4min
The Importance of Authority and Communication in a Successful Response
42:43 • 2min
The Importance of Communication in Security
44:26 • 2min
The Power of Communication
45:58 • 2min
The SEC Ruling Proposal on Incident Response
47:36 • 2min
The Four Day Window for Reporting a Breach
49:49 • 2min
How to Respond to a Security Event
52:10 • 2min
How to Handle a Four Day Reporting Thing
53:56 • 3min
How to Find the Right Active Directory Tool for Your Business
57:04 • 2min
The Role of Forensics in IR Investigations
59:15 • 2min
The Problem With Spiders
01:01:44 • 2min
The Importance of Instant Response
01:03:15 • 2min
How to Be a Successful Hacker
01:04:45 • 2min
Paul's Security Weekly: Security Weekly News
01:06:34 • 2min
Canon Printers and the Risks of Reselling
01:08:21 • 2min
The Probability of Someone Using This Password on a Canon Printer
01:09:53 • 2min
How to Avoid Targeted Attacks on E-Waste
01:11:44 • 2min
How to Change Your WPA to Pre Shared Key
01:13:21 • 2min
How Many Devices Do You Have in Your House?
01:14:52 • 2min
How to Recycle Electronics
01:16:24 • 2min
How to Avoid Air Gapped ICS Systems
01:17:59 • 2min
How to Fix a Hard Drive Light Attack
01:20:05 • 2min
How to Use Feedly to Tell People About Things They May Not Know About
01:21:37 • 2min
Zen Bleed: A New Attack on CPU Data Lake
01:23:26 • 2min
How to Use an 80 Bit Key to Capture a 40 Bit Key
01:25:04 • 2min
The Canon One: How Microsoft Is Bad
01:27:33 • 2min
Microsoft's Response to a Vulnerability in Azure
01:29:05 • 2min
The Ties Between Microsoft and the US Senator Cyber Attack
01:30:51 • 2min
Microsoft's Failure to Respond to the Hack
01:32:30 • 2min
Microsoft's Inconvenient and Costly Approach to Security
01:34:12 • 2min
Microsoft's Annual Gross Profit for 2023
01:36:06 • 2min
The Problem With SSL V3
01:38:22 • 2min
The Inconvenience of Using Microsoft Cloud Services
01:40:20 • 2min
How to Fix a Vulnerabilities Problem
01:41:54 • 2min
The Future of Investing
01:43:26 • 2min
The Two Sides to Every Story
01:45:06 • 2min
How to Protect Your Device and Firmware From Violent Attacks
01:46:40 • 2min
The Cost of Secure Boot Plus Signed Firmware
01:48:24 • 2min
The Importance of Device Unique Keys
01:50:13 • 2min
How to Make Secure Arch Linux Installations Secure
01:52:06 • 2min
Fancy Bear Goes Fishing
01:53:47 • 2min
The Morris Worm and the Five Hacks
01:55:18 • 2min
How to Make Risk-Based Decisions When You Don't Know if Something Has a Security Impact
01:57:13 • 2min
How to Get a Silent Security Commit to GitHub
01:58:44 • 2min
The Legal Obligation for Software Vendors to Report Security Problems
02:01:00 • 2min
The Circular Logic of CVSS Scores
02:02:30 • 2min
The Importance of Intentions in Security
02:04:19 • 2min
The Changes in PCI Vulnerability
02:05:57 • 2min
How to Protect Your System and Network From Malicious Software
02:08:15 • 2min
PCI 4.0: Patching Firmware?
02:10:26 • 1min
The Bane of PCI Since Day One
02:11:50 • 3min
PCI Guidance for Merchants
02:14:42 • 3min
How to Fix a Vulnerable Firmware Version
02:17:16 • 2min
The Problem With Remote Exploitable Firmware
02:19:05 • 2min
Testing 123: Is It Better?
02:20:56 • 2min
The Importance of Right Sizing in Sales Marketing
02:22:38 • 2min
How to Get Ready for the Next Job After Black Hat
02:24:31 • 2min
The Bottom to Black Hat
02:26:14 • 1min
How to Get Funding for Your Startup
02:27:42 • 2min
The Disconnect Between the Need for Cybersecurity Professionals and Organizations
02:29:19 • 2min
The Cycle of Cybersecurity
02:30:49 • 2min
The Future of Security in the University
02:33:07 • 2min
The Predation of the Smart Device
02:35:11 • 2min
The Future of Isolation
02:36:43 • 2min
The Ripple Effect of the COVID
02:38:26 • 3min
How to Be More Safe When Browsing the Internet
02:41:27 • 2min
The Importance of Ad Blockers
02:43:12 • 2min
How to Avoid Car Thieves
02:44:57 • 2min
10 Reasons to Be Optimistic About the Future of Cars
02:46:52 • 2min
Why I Leave My iPhone in the Car
02:48:38 • 2min
How to Break Into a Car
02:50:16 • 2min
The Cost of a Triple a Service
02:51:59 • 2min
How to Hit the Glass in a Corner
02:54:10 • 2min
Ten Reasons for Optimism in Cyber Security
02:55:44 • 2min
How to Get Leadership Buy-in for Secure Products
02:57:23 • 2min
The Voynich Manuscript
02:59:21 • 2min
The One H Manage Manuscript
03:01:01 • 2min
Cryptography and the Language
03:02:34 • 2min
The Importance of Patterns in Cryptoanalysis
03:04:14 • 2min
The Secret, a Treasure Hunt
03:06:06 • 2min
The Joe Rogan Experience
03:08:34 • 2min
Xbox Original Xbox Mods and Nintendo Switch Mods
03:10:49 • 3min