Exploring the defensive side of cybersecurity through the eyes and experts.and innovators in the space. Exploring topics such as threat intelligence, threat hunting, security operations and more.
All content for Hacker Valley Blue is the property of Hacker Valley Media and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Exploring the defensive side of cybersecurity through the eyes and experts.and innovators in the space. Exploring topics such as threat intelligence, threat hunting, security operations and more.
If want to get into computer security, you're going to learn to love it, you're going to have to be successful, because a lot of computer security isn't just about bits and bytes, it's really about effectively communicating what needs to be done to the right people.
In this episode we have the incredible John Strand. Organizations need to become more proactive, and see where those weak spots are to protect themselves from something like ransomware. You need to run a pen test because you can have somebody literally launch those attacks, and identify those weaknesses in those vulnerabilities before the bad people do.
What's the gap that we can all learn from? It's passwords. By and large for most users, passphrases are the way to go. And, multi-factor authentication is actually a very sound strategy.
If you look at one key tenant of computer security, complexity is the enemy of computer security. And security is constantly trying to catch up and protect against yesterday's attacks. So, the future is more connected, it's more complicated. And the problem is, we still have people that use weak passwords, we still have people that click on links from strangers. And ultimately, when we're looking at that future, you're going to see the exact same problems that we've always had complicated on a much, much, much, much, much larger scale. As things get more and more pushed to the cloud. There'll be no shelter here, the front line is everywhere. World of computer security.
Key Takeaways:
0:00 Previously on the show2:02 John introduction2:44 Episode begins2:47 What John is doing today3:45 John’s core tenets5:51 How pen testing is “Blue”6:17 Why understanding fundamentals matters8:55 Ransomware10:41 Organizations need to be prepared11:58 Password gap13:37 Password philosophy17:07 Multi-factor authentication21:40 What to do today24:24 New problems26:44 Learn your own network28:26 Where to find John
John Strand on Twitter
John Strand on LinkedIn
Black Hills Information Security
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ron Eddings on Twitter
Follow Chris Cochran on Twitter
Sponsored by Axonius
Hacker Valley Blue
Exploring the defensive side of cybersecurity through the eyes and experts.and innovators in the space. Exploring topics such as threat intelligence, threat hunting, security operations and more.