ºÝºÝߣshows by User: securityweekly / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: securityweekly / Mon, 11 May 2015 13:56:23 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: securityweekly Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program /slideshow/robots-ninjas-pirates-and-building-an-effective-vulnerability-management-program/47997757 robotsninjaspirates-vulnmgt-2015-150511135624-lva1-app6891
A robot, a ninja and a pirate get into a fight. The question is: who wins? While we can debate this question until the end of time, likely have fun in the process; it’s a waste of time. Who are the robots, ninjas and pirates in your environment? What roles do they play in the vulnerability management process?  We debate how to build a vulnerability management program all the time, however we are still spinning our wheels. Unlike the robot, ninja, pirate battle, there are concrete facts that will help you build a successful program, and avoid smoke bombs, swords, and robot death rays. Who wins? Find out in this presentation and learn how to protect your booty.]]>

A robot, a ninja and a pirate get into a fight. The question is: who wins? While we can debate this question until the end of time, likely have fun in the process; it’s a waste of time. Who are the robots, ninjas and pirates in your environment? What roles do they play in the vulnerability management process?  We debate how to build a vulnerability management program all the time, however we are still spinning our wheels. Unlike the robot, ninja, pirate battle, there are concrete facts that will help you build a successful program, and avoid smoke bombs, swords, and robot death rays. Who wins? Find out in this presentation and learn how to protect your booty.]]>
Mon, 11 May 2015 13:56:23 GMT /slideshow/robots-ninjas-pirates-and-building-an-effective-vulnerability-management-program/47997757 securityweekly@slideshare.net(securityweekly) Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program securityweekly A robot, a ninja and a pirate get into a fight. The question is: who wins? While we can debate this question until the end of time, likely have fun in the process; it’s a waste of time. Who are the robots, ninjas and pirates in your environment? What roles do they play in the vulnerability management process?  We debate how to build a vulnerability management program all the time, however we are still spinning our wheels. Unlike the robot, ninja, pirate battle, there are concrete facts that will help you build a successful program, and avoid smoke bombs, swords, and robot death rays. Who wins? Find out in this presentation and learn how to protect your booty. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/robotsninjaspirates-vulnmgt-2015-150511135624-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A robot, a ninja and a pirate get into a fight. The question is: who wins? While we can debate this question until the end of time, likely have fun in the process; it’s a waste of time. Who are the robots, ninjas and pirates in your environment? What roles do they play in the vulnerability management process?  We debate how to build a vulnerability management program all the time, however we are still spinning our wheels. Unlike the robot, ninja, pirate battle, there are concrete facts that will help you build a successful program, and avoid smoke bombs, swords, and robot death rays. Who wins? Find out in this presentation and learn how to protect your booty.
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program from Security Weekly
]]>
2214 5 https://cdn.slidesharecdn.com/ss_thumbnails/robotsninjaspirates-vulnmgt-2015-150511135624-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Pwn phone2014 jrs /slideshow/pwn-phone2014-jrs-41563182/41563182 y9a1m0o5tsis4ujnammm-signature-a9cb94d4df6b77daeb1001c298aa3003f0607aa6e3b03757c48656c90a7f2a10-poli-141114093526-conversion-gate02
]]>

]]>
Fri, 14 Nov 2014 09:35:26 GMT /slideshow/pwn-phone2014-jrs-41563182/41563182 securityweekly@slideshare.net(securityweekly) Pwn phone2014 jrs securityweekly <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/y9a1m0o5tsis4ujnammm-signature-a9cb94d4df6b77daeb1001c298aa3003f0607aa6e3b03757c48656c90a7f2a10-poli-141114093526-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Pwn phone2014 jrs from Security Weekly
]]>
890 1 https://cdn.slidesharecdn.com/ss_thumbnails/y9a1m0o5tsis4ujnammm-signature-a9cb94d4df6b77daeb1001c298aa3003f0607aa6e3b03757c48656c90a7f2a10-poli-141114093526-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Give Me Three Things: Anti-Virus Bypass Made Easy /slideshow/give-me-three-things-antivirus-bypass-made-easy/40969775 webcast613medits6-3-13forpaul-141031110323-conversion-gate02
John Strand shows us 3 simple AV Bypass Techniques!]]>

John Strand shows us 3 simple AV Bypass Techniques!]]>
Fri, 31 Oct 2014 11:03:22 GMT /slideshow/give-me-three-things-antivirus-bypass-made-easy/40969775 securityweekly@slideshare.net(securityweekly) Give Me Three Things: Anti-Virus Bypass Made Easy securityweekly John Strand shows us 3 simple AV Bypass Techniques! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webcast613medits6-3-13forpaul-141031110323-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> John Strand shows us 3 simple AV Bypass Techniques!
Give Me Three Things: Anti-Virus Bypass Made Easy from Security Weekly
]]>
3766 6 https://cdn.slidesharecdn.com/ss_thumbnails/webcast613medits6-3-13forpaul-141031110323-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Internet of Insecure Things: 10 Most Wanted List /slideshow/the-internet-of-insecure-things-10-most-wanted-list-40276892/40276892 internetofthings-insecure-top10mostwanted-140623111537-phpapp01-141014200000-conversion-gate01
In this talk I will quickly bring you up to speed on the history of embedded device insecurity. Next, we will look at a real-world example or two of how devices are exploited (And attackers profited). Finally, you will learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives. You may have heard about this threat, one that has plagued our lives and networks for well over a decade. A problem so ubiquitous, it can't be ignored. Yet, this threat has a history of hiding in plain sight. Users are, for the most part, unaware of the dangers. Security researchers and the media have attempted to highlight this problem for years, without making an impact on improving security. However, vendors and users are still very much at risk and the problem is still largely being ignored by the masses. The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. The goal of this talk is to enable the audience to help raise awareness and influence the security of embedded systems in a positive way.]]>

In this talk I will quickly bring you up to speed on the history of embedded device insecurity. Next, we will look at a real-world example or two of how devices are exploited (And attackers profited). Finally, you will learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives. You may have heard about this threat, one that has plagued our lives and networks for well over a decade. A problem so ubiquitous, it can't be ignored. Yet, this threat has a history of hiding in plain sight. Users are, for the most part, unaware of the dangers. Security researchers and the media have attempted to highlight this problem for years, without making an impact on improving security. However, vendors and users are still very much at risk and the problem is still largely being ignored by the masses. The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. The goal of this talk is to enable the audience to help raise awareness and influence the security of embedded systems in a positive way.]]>
Tue, 14 Oct 2014 20:00:00 GMT /slideshow/the-internet-of-insecure-things-10-most-wanted-list-40276892/40276892 securityweekly@slideshare.net(securityweekly) The Internet of Insecure Things: 10 Most Wanted List securityweekly In this talk I will quickly bring you up to speed on the history of embedded device insecurity. Next, we will look at a real-world example or two of how devices are exploited (And attackers profited). Finally, you will learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives. You may have heard about this threat, one that has plagued our lives and networks for well over a decade. A problem so ubiquitous, it can't be ignored. Yet, this threat has a history of hiding in plain sight. Users are, for the most part, unaware of the dangers. Security researchers and the media have attempted to highlight this problem for years, without making an impact on improving security. However, vendors and users are still very much at risk and the problem is still largely being ignored by the masses. The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. The goal of this talk is to enable the audience to help raise awareness and influence the security of embedded systems in a positive way. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/internetofthings-insecure-top10mostwanted-140623111537-phpapp01-141014200000-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this talk I will quickly bring you up to speed on the history of embedded device insecurity. Next, we will look at a real-world example or two of how devices are exploited (And attackers profited). Finally, you will learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives. You may have heard about this threat, one that has plagued our lives and networks for well over a decade. A problem so ubiquitous, it can&#39;t be ignored. Yet, this threat has a history of hiding in plain sight. Users are, for the most part, unaware of the dangers. Security researchers and the media have attempted to highlight this problem for years, without making an impact on improving security. However, vendors and users are still very much at risk and the problem is still largely being ignored by the masses. The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. The goal of this talk is to enable the audience to help raise awareness and influence the security of embedded systems in a positive way.
The Internet of Insecure Things: 10 Most Wanted List from Security Weekly
]]>
3419 4 https://cdn.slidesharecdn.com/ss_thumbnails/internetofthings-insecure-top10mostwanted-140623111537-phpapp01-141014200000-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Attacking Embedded Devices (No Axe Required) /securityweekly/attacking-embedded-devices-no-axe-required-40275389 attackingembeddeddevices-140513130258-phpapp02-141014185044-conversion-gate01
Learn how to attack embedded systems]]>

Learn how to attack embedded systems]]>
Tue, 14 Oct 2014 18:50:44 GMT /securityweekly/attacking-embedded-devices-no-axe-required-40275389 securityweekly@slideshare.net(securityweekly) Attacking Embedded Devices (No Axe Required) securityweekly Learn how to attack embedded systems <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/attackingembeddeddevices-140513130258-phpapp02-141014185044-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn how to attack embedded systems
Attacking Embedded Devices (No Axe Required) from Security Weekly
]]>
3258 6 https://cdn.slidesharecdn.com/ss_thumbnails/attackingembeddeddevices-140513130258-phpapp02-141014185044-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How To Do A Podcast - Bsides RI 2013 /slideshow/how-to-do-a-podcast-bsides-ri-2013/40227363 howtodoapodcast-141013205148-conversion-gate01
How to do a podcast from Paul Asadoorian, founder & CEO of Security Weekly and Stogie Geeks]]>

How to do a podcast from Paul Asadoorian, founder & CEO of Security Weekly and Stogie Geeks]]>
Mon, 13 Oct 2014 20:51:48 GMT /slideshow/how-to-do-a-podcast-bsides-ri-2013/40227363 securityweekly@slideshare.net(securityweekly) How To Do A Podcast - Bsides RI 2013 securityweekly How to do a podcast from Paul Asadoorian, founder & CEO of Security Weekly and Stogie Geeks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtodoapodcast-141013205148-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to do a podcast from Paul Asadoorian, founder &amp; CEO of Security Weekly and Stogie Geeks
How To Do A Podcast - Bsides RI 2013 from Security Weekly
]]>
1413 6 https://cdn.slidesharecdn.com/ss_thumbnails/howtodoapodcast-141013205148-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014 /slideshow/the-internet-of-insecure-things-10-most-wanted-list-derbycon-2014/40224733 derbycon2014-internetofinsecurethings-141013185940-conversion-gate02
The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. This talk will look at the history of embedded device insecurity. We’ll explore some real-world example of how devices are exploited (and attackers profited). You will also learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives.]]>

The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. This talk will look at the history of embedded device insecurity. We’ll explore some real-world example of how devices are exploited (and attackers profited). You will also learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives.]]>
Mon, 13 Oct 2014 18:59:40 GMT /slideshow/the-internet-of-insecure-things-10-most-wanted-list-derbycon-2014/40224733 securityweekly@slideshare.net(securityweekly) The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014 securityweekly The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. This talk will look at the history of embedded device insecurity. We’ll explore some real-world example of how devices are exploited (and attackers profited). You will also learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/derbycon2014-internetofinsecurethings-141013185940-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. This talk will look at the history of embedded device insecurity. We’ll explore some real-world example of how devices are exploited (and attackers profited). You will also learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives.
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014 from Security Weekly
]]>
1611 4 https://cdn.slidesharecdn.com/ss_thumbnails/derbycon2014-internetofinsecurethings-141013185940-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-securityweekly-48x48.jpg?cb=1523685931 The Security Weekly mission is to provide free content within the subject matter of IT security news, vulnerabilities, hacking, and research. We strive to use new technologies to reach a wider audience across the globe to teach people how to grow, learn, and be security ninjas. The mixture of technical content and entertainment will continue to set a new standard for podcasting and Internet TV. securityweekly.com https://cdn.slidesharecdn.com/ss_thumbnails/robotsninjaspirates-vulnmgt-2015-150511135624-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/robots-ninjas-pirates-and-building-an-effective-vulnerability-management-program/47997757 Robots, Ninjas, Pirate... https://cdn.slidesharecdn.com/ss_thumbnails/y9a1m0o5tsis4ujnammm-signature-a9cb94d4df6b77daeb1001c298aa3003f0607aa6e3b03757c48656c90a7f2a10-poli-141114093526-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/pwn-phone2014-jrs-41563182/41563182 Pwn phone2014 jrs https://cdn.slidesharecdn.com/ss_thumbnails/webcast613medits6-3-13forpaul-141031110323-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/give-me-three-things-antivirus-bypass-made-easy/40969775 Give Me Three Things: ...