Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/a7/f5/18/a7f51856-5eee-0628-edca-2ffe86da29cb/mza_12663151903205576483.jpg/600x600bb.jpg
Cyber Security
SE LABS ®
17 episodes
3 months ago
A presentation special from the AVAR conference in Singapore, December 2022! › What is the attack chain?Why is it good to test using full attack chains?And what are some of the alternative approaches, with their pros and cons?Security Life Hack from Simon Edwards (SE Labs)! (Full Show Notes available on our website.)
Show more...
Technology
Business,
Management
RSS
All content for Cyber Security is the property of SE LABS ® and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
A presentation special from the AVAR conference in Singapore, December 2022! › What is the attack chain?Why is it good to test using full attack chains?And what are some of the alternative approaches, with their pros and cons?Security Life Hack from Simon Edwards (SE Labs)! (Full Show Notes available on our website.)
Show more...
Technology
Business,
Management
Episodes (17/17)
Cyber Security
Full attack chain testing | S2E9
A presentation special from the AVAR conference in Singapore, December 2022!What is the attack chain?Why is it good to test using full attack chains?And what are some of the alternative approaches, with their pros and cons?Security Life Hack from Simon Edwards (SE Labs)!(Full Show Notes available on our website.)Website | Subscribe | LinkedIn
Show more...
2 years ago
20 minutes

Cyber Security
Cheating in security testing | S2E8
We explore how testers behave, or misbehave. And the different ways, some more honest than others, that security vendors engage with testing. Can you trust security tests?What do their results actually mean?How honest are the testers and the security companies they test? Guests on this month's Cyber Security DE:CODED podcast include Richard Ford (Praetorian).Plus a full bonus interview with Richard Ford.Security Life Hack from Siggi Stefnisson (Gen)!(Full Show Notes available on our...
Show more...
2 years ago
36 minutes

Cyber Security
Security opportunities for Managed Services Providers | S2E7
Small business and Managed Service Provider special!Do small businesses face the same cyber threats as large organisations?Are your security solutions 100% effective? And how do you pick a good one?Where are the opportunities for MSPs to add value and make more money?In June 2022 we set up a panel of security experts to help and advise companies selling managed security services. Managed Service Providers (MSPs) need to choose a set of security solutions that they can use or possibly resell t...
Show more...
2 years ago
38 minutes

Cyber Security
Mental health challenges | S2E6
Mental health is an important but often misunderstood area, full of prejudice and technical jargon. How can we look after ourselves better at work and in our personal lives?Post-pandemic, we take stock on the mental impacts of working from home and isolated environments. And now we’re facing hybrid working. Can we take control?Is this the right time to take stock and address any issues we can identify to stay happier?Protective factors can keep us going but, when they disappear, we can experi...
Show more...
3 years ago
45 minutes

Cyber Security
Ransomware | S2E5
Ransomware is feared by businesses all over the world. What happens during and after an attack? We give a unique insight into the experiences of ransomware victims.How do organisations react to a ransomware attack?We examine the grey area between good and bad apps Guests on this month's Cyber Security DE:CODED podcast include Jeremy Kirk (The Ransomware Files) and Dennis Batchelder (AppEsteem).Plus a full bonus interview with Jeremy Kirk.Security Life Hack from Brian Monkman (NetSecOPEN)...
Show more...
3 years ago
58 minutes

Cyber Security
Cloud security | S2E4
The 'cloud' is integrating with our lives at ever more useful (or intrusive!) levels. We look at what securing the cloud means in the real world.Securing the cloud and testing cloud securityCryptocurrency security tipsWhat does a personal hack attack look like? Guests on this month's Cyber Security DE:CODED podcast include Eugene Kaspersky (Kaspersky) and Luis Corrons (Avast).Plus a full bonus interview with Luis Corrons.Security Life Hack from Chad Skipper (VMware)!(Full Show Notes avai...
Show more...
3 years ago
29 minutes

Cyber Security
Testing like hackers | S2E3
What does it mean to test like a hacker? Can a well-intentioned tester behave the same as a real cybercriminal?When you’re looking for a good security test, how can you tell the useful from the misleading?Our email accounts sit at the centre of our digital lives. We look at ways to bullet-proof your most important internet account.We discuss these questions, and more, with Frank Duff (ex-MITRE, now Tidal Cyber), Mike Sentonas (CrowdStrike) and Siggi Stefnisson (Avast).Security Life Hack from ...
Show more...
3 years ago
42 minutes

Cyber Security
Firewall speeds and VPN risks | S2E2
Is your firewall as fast as you think?What does XDR mean and how does it work?Do you need a personal VPN?We talk to Brian Monkman (NetSecOPEN), Chad Skipper (VMware), Luis Corrons (Avast) and Daniel Cuthbert.Security Life Hack from Dennis Batchelder (AppEsteem)!(Full Show Notes available on our website.) Website | Subscribe | LinkedIn
Show more...
3 years ago
56 minutes

Cyber Security
Can Microsoft solve security? | S2E1
Can Microsoft solve security? Do you need anti-virus on your smartphone? And are Macs more secure than PCs? We ask Eugene Kaspersky (Kaspersky) and Christian Seifert (Microsoft)Security Life Hack from Mikko Mikko Hyppönen (WithSecure)(Full Show Notes available on our website.)Website | Subscribe | LinkedIn
Show more...
3 years ago
38 minutes

Cyber Security
9 Hollywood Hacker Movies Rated | S1E8
Simon and Marc discuss and dissect 9 Hollywood hacker movies from the last 30+ years, including:SnowdenBlackhatDie Hard 4.0 (Live Free or Die Hard)Who Am IFast and Furious 8 (The Fate of the Furious)The Social NetworkHackersSneakersWarGamesWhich are the most realistic? Or stupid? And why?We don't take a totally nerdy approach to this. Reasonable latitude is given to artistic license. But we take a zero tolerance approach to loud keyboards.Also featured:The NetMr RobotWebsite | Subscribe | Lin...
Show more...
4 years ago
1 hour 3 minutes

Cyber Security
What Does a Breach Look Like? | S1E7
In this episode we’re going to look at what a computer breach, or hack, actually looks like. From both the attacker and defender’s points of view.We welcome special guest St. John Harold, a cyber security veteran of 20 years experience in the armed forces, governmental organisations and commercial companies.(Full Show Notes available on our website.) Website | Subscribe | LinkedIn
Show more...
4 years ago
43 minutes

Cyber Security
Understanding and Managing Risk | S1E6
In this episode Simon and Marc focus on the basics of understanding and managing risk. They discuss insurance, how to assess the risk of anything (from dropping a cup of tea on an expensive server to animal attacks!) and touch on ransomware.We look at the issues from the perspective of executives in large organisations and founders setting up their own startups.(Full Show Notes available on our website.) Website | Subscribe | LinkedIn
Show more...
4 years ago
43 minutes

Cyber Security
Selling Security - The Insider's Guide | S1E5
Companies spend trillions on cyber security each year. But how do they decide which products and services are the best?We dig down into the sometimes shady world of cyber security sales, market analysis and product testing. How do the relationships work between clients, salespeople, analysts, testers and the media?Simon Edwards (SE Labs) talks to special guests Allison Elizondo (ex-NSS Labs, now SentinelOne) and Nabil Khokhar (ex-Glencore, now DarkGuard)(Full Show Notes available on our websi...
Show more...
4 years ago
50 minutes

Cyber Security
Cyber Security First Principles | S1E4
We continue our first series on cyber security by looking at the most basic concepts.Why can't we just lock everything up in a safe?Is cyber security for large businesses more complicated than it needs to be?How do governments and spy agencies approach the problem?How can we use these concepts to secure our businesses and our families?(Full Show Notes available on our website.) Website | Subscribe | LinkedIn
Show more...
4 years ago
11 minutes

Cyber Security
Is Anti-Virus Dead? | S1E3
Anti-virus seems to keep dying! Simon Edwards looks at why people keep repeating the claim and why it's important to understand the issues, even if you don't agree with them.What is "anti-virus" anyway?Naughty marketing claimsOpinionated researchers with inside knowledgeOutdated opinionsGrumpy software developersAnd the briefest history of computer anti-virus that we could manage.(Full Show Notes available on our website.) Website | Subscribe | LinkedIn
Show more...
4 years ago
26 minutes

Cyber Security
Official Cyber Security Advice | S1E2
Where can large and small businesses find good, basic cyber security advice?We look at the options and discuss the UK's Cyber Essentials programme. Is it a good start or a non-starter?(Full Show Notes available on our website.) Website | Subscribe | LinkedIn
Show more...
4 years ago
32 minutes

Cyber Security
How attackers attack | S1E1
How do attacker attack? We look at their tactics and explore your options to help recognise and evade them. We examine social engineering in a cyber security and physical context, as well as technical exploits.(Full Show Notes available on our website.) Website | Subscribe | LinkedIn
Show more...
4 years ago
44 minutes

Cyber Security
A presentation special from the AVAR conference in Singapore, December 2022! › What is the attack chain?Why is it good to test using full attack chains?And what are some of the alternative approaches, with their pros and cons?Security Life Hack from Simon Edwards (SE Labs)! (Full Show Notes available on our website.)