Talkin' Bout [Infosec] News

Black Hills Information Security
undefined
Jul 30, 2018 • 51min

PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management

CJ Cox talks about the highs, lows, hows and why's of security policy.
undefined
Jul 16, 2018 • 51min

PODCAST: Highly Caffeinated InfoSec

Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode here and look at the slides here.
undefined
Jul 16, 2018 • 49min

PODCAST: Attack Tactics Part 3: No Active Directory? No Problem!

John Strand talks about how BHIS pen tests companies who use the cloud. Want to know how you can defend against attacks in your cloud infrastructure? Keep your eyes peeled for part 4! Links: Slides for this webcast can be found here,
undefined
Jul 12, 2018 • 45min

PODCAST: Lee Kagan & Beau Bullock talk C2

Special guest Lee Kagan from RedBlack Security talks about his script, his previous guest posts and the future of C2 with Beau Bullock and Sierra. Check out these links: How to Build a C2 Infrastructure with Digital Ocean – Part 1 How to Build a C2 Inf...
undefined
Jul 2, 2018 • 51min

PODCAST: Hacker Tools, Compliments of Microsoft

Sally Vandeven & David Fletcher discuss Microsoft Sysinternals Suite
undefined
Jun 20, 2018 • 47min

PODCAST: Testing G Suites with MailSniper

Testing G Suites with Mailsniper
undefined
Jun 13, 2018 • 1h 1min

PODCAST: Attack Tactics Part 2

John talked about how we’d attack, here’s how you can defend against those attacks. Grab the slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/
undefined
Jun 13, 2018 • 55min

PODCAST: Attack Tactics Part 1

This is the audio only version of John’s webcast about how we would attack your company during a pentest. Grab his slides here:  https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/
undefined
Jun 4, 2018 • 55min

WEBCAST: Attack Tactics Part 1

John Strand // John is starting a new series of webcasts called Attack Tactics. This first part is a step-by-step walk-through of an attack BHIS launched against a customer, with just a few obfuscating tweaks.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app