Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Introduction
00:00 • 5min
How to Mitigate the Damage Done by Cyber Attacks
05:11 • 6min
The Known Exploited Vulnerabilities Catalog
11:03 • 5min
Dell Compellent Hard-Coded Key Exposes VMware vCenter Admin Creds
15:53 • 2min
How to Make Secure Encryption Work for Your Organization
17:45 • 3min
The Impact of a Hard Coded Key on a VMware Solution
21:05 • 3min
AI Village: A Sub Village Inside of AI Village
23:51 • 4min
The Importance of Advising Your Apple Population
28:20 • 4min
How to Be a Successful YouTuber
32:33 • 6min
Bulletproof Hosting Takes Down in Poland
38:18 • 2min
The Appeal of Bulletproof Hosting
40:25 • 6min
How to Fish Emails and Attack Executives
46:00 • 5min
Kaspersky Threat Intelligence - APT 31 Linked to Recent Industrial Attacks in Eastern Europe
50:56 • 2min
Kaspersky's Report on China's TTPs
52:42 • 4min
Tampa General Hospital Sued Over Data Breach
56:34 • 2min
The Class Action Lawsuit for Tampa General Hospital
58:55 • 5min
The Importance of Jawjacking
01:04:14 • 5min
How to Break Into Cyber From Fast Food
01:09:34 • 5min
The IRS Investigates Non-Tax Related Crimes
01:14:46 • 3min
How to Implement User Friendly Tools for Third Party Vendor Due Diligence
01:17:29 • 5min
The Top 10 Tools for Higher Ed
01:22:54 • 2min
The Trace Labs CTF at Defcon
01:24:58 • 5min
Simply Cyber's Values
01:29:40 • 2min


