BrakeSec Education Podcast cover image

BrakeSec Education Podcast

Latest episodes

undefined
Mar 31, 2014 • 36min

Episode 10: IDS/IPS

We discuss IDS and IPS, why they are needed, and why they get a pass on how easily they are bypassed, and why AV gets all the press...           Intro "Private Eye", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/      
undefined
Mar 24, 2014 • 34min

Episode 9: Framework for Improving Critical Infrastructure Cybersecurity

This week, we got into some discussion about frameworks, and the different types of frameworks available (regulatory, "best practice", and process improvement) We also looked at the new "Framework for Improving Critical Infrastructure Cybersecurity" ratified and released last month. Does it meet with our high expectations? You'll just have to listen and find out.   http://www.nist.gov/cyberframework/       Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
undefined
Mar 18, 2014 • 43min

Episode 8: Why a simple password is not so simple...

Cracking great show this week!  Mr. Boettcher and I got all into authentications methods, why they don't always work, and what can we do to make passwords more secure, using Mike Murray's method of 'Passphrases' over passwords...   Finally, we talked about some adventure Mr. boettcher had with a friend's malware infection (it wasn't me, I promise!).  He took what we learned from @hackerhurricane (Michael Gough) and is actively doing forensics on it.     http://daleswanson.org/things/password.htm Malware, Rootkits & Botnets A Beginner's Guide by Christopher Elisan               Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
undefined
Mar 9, 2014 • 52min

Episode 7, Part 2 with Kevin Johnson from SecureIdeas!

This is the Part 2 of our Interview with Kevin Johnson.  During our interview, we followed him down the rabbit hole.  We learned how to default rulesets in ANY rules based hardware solution sucks.  We learned that being a security professional is more than just a fancy title.  And finally, we learned that Kevin is a huge fan of Star Wars.   DB Visualizer --  http://www.dbvis.com/   Good article on how homomorphic encryption works: http://www.americanscientist.org/issues/pub/2012/5/alice-and-bob-in-cipherspace     Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
undefined
Mar 4, 2014 • 38min

Episode 7, Part 1 - Kevin Johnson of SecureIdeas!

During our SEC542, GIAC Web App Pentesting course, we got the pleasure and honor of sitting down with Kevin Johnson from SecureIdeas on who he is, how Samurai WTF came into being, and why we should be doing licensing for proper ethcial hackers.   Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
undefined
Feb 24, 2014 • 45min

Episode 6 - Malware Interview with Michael Gough (Part 2)

This is part 2 of our Interview with Malware researcher Michael Gough.  We talk about mobile device malware, and how the Sniper Forensic Toolkit, differs from Tripwire.   Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/ "Infectedpc_primary.jpg is from bugsrepair.com
undefined
Feb 17, 2014 • 42min

Episode 6 - Malware Interview Michael Gough (Part 1)

This week, we are excited to have Michael Gough, a local malware researcher from Mi2Security on with us to talk about types of malware, infection vectors, some of the tools that users have available to them to detect and prevent malware.  We also discuss who gains from malware infections, the 'bad guys', and even the AV/Malware detection companies.  We also talk about how his software program "Sniper Forensic Toolkit" would detect malware.   Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
undefined
Feb 10, 2014 • 19min

Episode 5 - Interview with Frank Kim

This week, we interviewed Frank Kim, an instructor from SANS, talks about developers methods, the challenges of getting developers to code securely, and the efforts to create a culture of secure coding. Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
undefined
Feb 3, 2014 • 33min

Episode 4: Origin stories, and talking about reconnaissance

All superheroes have an origin story, Brian and I are not super, but we have a great origin story.  This week's podcast is about how we made it into the Infosec industry, and we also discuss the value of research from an OS point of view.  We also talk about mentoring and assistance for those looking to get into the InfoSec world. Intro "Private Eye" and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
undefined
Jan 27, 2014 • 33min

Episode 3 - Alerts, Events, and a bit of incident response

In this issue, we talked about upcoming podcasts with Michael Gough from MI2 Security discussing malware, and this week we get into everything about alerts, why they are important, types of alerts, levels that can occur, and even a bit of incident response in handling alerts. Intro "Private Eye" and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app