…
continue reading
1
How to achieve the Defense Department’s CMMC compliance with Frank Smith
32:59
32:59
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:59
Did you know that the Department of Defense (DOD) is mandating that suppliers have Cybersecurity Maturity Model Certification (CMMC) to a prescribed level? In this episode, Frank Smith, Manager of Security and Consulting Practice at Ntiva, shares all you need to know about CMMC. Discover what CMMC is, why you should care, the requirements needed fo…
…
continue reading
1
Developing a Security Test Methodology with Mike Spanbauer
34:42
34:42
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:42
I today’s episode, I’m going to be sharing a session that Mike Spanbauer, Security Evangelist for Juniper, gave at the last Secure Guild online conference on Developing a Security Test Methodology. Discover the four pieces that make up his approach and some essential tips in implementing your own. Listen up!…
…
continue reading
1
Prioritize Your Open Source Findings with James Rabon
22:10
22:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:10
Does your team struggle with prioritizing your security open-source findings? In this episode, James Rabon, Director of Product Management at Micro Focus, will share an approach that can help. Discover how James’ team co-developed “susceptibility analysis,” which allows developers and application security engineers determine whether a publicly-disc…
…
continue reading
Cybersecurity concepts are fundamental pieces of knowledge necessary for a career in security testing. In this episode, Joe Abraham, author of numerous Pluralsight courses, will share some insights into many security aspects. Listen in to learn about security onion, threat intelligence, cyber threat hunting tips and more.…
…
continue reading
1
TrustedSec Sysmon Community Guide with Carlos Perez
29:38
29:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:38
Are you struggling to find information on how to use Sysmon for your security efforts? In this episode, Carlos Perez, a Research Team lead at TrustedSec, shares all about the TrustedSec Sysmon Community Guide. Discover why Carlos created this guide and how it helps empower defenders with the information they need to leverage this great tool. Also, …
…
continue reading
1
Cybersecurity Tools and Frameworks with Aaron Rosenmund
31:34
31:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:34
Aaron Rosenmund, a cybersecurity researcher at Pluralsight, shares a wealth of knowledge around security testing in this episode. Discover blue team tools to protect, detect, and respond against targeted threat actor techniques in an enterprise environment. Listen in to also learn security frameworks to help you with your threat hunting efforts…
…
continue reading
1
Information Gathering in Penetration Testing with Malek Mohammad
21:35
21:35
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
21:35
How can you prevent attacks if you don't know your enemy? In this episode, Malek Mohammad, author of the Pluralsight course: Web Application Penetration Testing: Information Gathering, discusses how to know how your enemies target you. Discover fingerprinting web applications, enumerating applications, understanding their entry points, and tooling …
…
continue reading
Happy New Year! We will be away for a few weeks but will be back with more security testing awesomeness in 2021. Also, don't forget to register for AutomationGuild.
…
continue reading
1
AWS Penetration Testing with Jon Helmus
28:52
28:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:52
Need to secure your AWS environments? In this episode, Jonathan Helmus, author of the new book AWS Penetration Testing, will share some tips on AWS penetration testing and security best practices. Discover some of the commonly exploited vulnerabilities in AWS and how to prevent them. Listen in to learn more about cloud penetration testing tips, and…
…
continue reading
1
Discover Network Vulnerabilities using Infection Monkey with Maril Vernon
30:44
30:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:44
Are you using Infection Monkey? In this episode, Pluralsight author and security expert Maril Vernon will share some insights from her Infection Monkey course. Discover uses of Infection Monkey to test for later movement and network segments against known MITRE tactics. Listen up to learn how this amazing tool can identify your company’s vulnerable…
…
continue reading
1
OWASP Broken Authentication Breakdown with Prasad Salvi
23:23
23:23
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
23:23
Prepare to learn all about the OWASP Top 10 Web Application Security Risks—Broken Authentication. This is the second monthly episode in which security expert Prasad Salvi will join us to break down each OWASP risk one by one. Today we’ll discuss the second security risk listed—broken authentication. Discover what a broken authentication risk is, th…
…
continue reading
1
API Security Testing In DevOps with Oli Moradov
46:05
46:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
46:05
How do you integrate API security testing into the development process? In this episode, Oli Moradov, VP of Dev and Strategic Alliances at NeuraLegio, shares ways that you can achieve API security testing automation directly into your DevOps or CI/CD pipelines. Discover how you can test every build without causing development drag. Listen up!…
…
continue reading
1
Covid-19 Security and OWASP with Adiran Thirmal
34:03
34:03
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:03
Has COVID-19 impacted your security testing efforts? In this episode, security expert Adhiran Thirmal shares his thoughts on security testing, Covid-19, OWASP, and more. Listen up and find out more about changes to OWASP for 2020 and beyond and how you can help.
…
continue reading
1
SQL Injection OWASP Top 10 with Prasad Salvi
25:23
25:23
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
25:23
Are you familiar with the OWASP Top 10 Web Application Security Risks? This is the first monthly episode where security expert Prasad Salvi joins us to break down each risk one by one. Today we talk all about the first security risk listed -- injection flaws. Discover what an injection flaw is, different ways this attack can occur, and how to preve…
…
continue reading
Peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics. In this episode, Paul Marrapese, a security researcher, shares his story of how supply chain vulnerabilities in modern IP cameras, baby monitors, and even alarm systems are putting millions at risk for eavesdropping and remote compro…
…
continue reading
1
Avoid Being Runtime Blind using DeepFactor with Kiran Kamity & Mike Larkin
36:03
36:03
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
36:03
I believe most teams have a massive gap in their pre-production stage of development. In this episode, Kiran Kamity, Founder and CEO of DeepFactor, and Mike Larkin, Founder and CTO of DeepFactor, will share why Pre-production Observability is critical to ensuring your applications are secure, compliant, and performant. Discover how to inject the vi…
…
continue reading
1
The Power of a Threat Aware Network with Mike Spanbauer
31:37
31:37
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:37
Security is a difficult discipline to master. It requires experts to continuously challenge themselves and learn new tools and technologies to protect their organizations. In this episode, Mike Spanbauer, Technology Evangelist at Juniper, will discuss some ways to build a threat-aware network. Discover a new way to think about your approach to secu…
…
continue reading
1
Client Side Penetration Testing with Prasad Salvi
27:54
27:54
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
27:54
Don’t let hackers execute different client-side attacks on your website. In this episode, Prasad Salvi will cover some of the most important concepts in his Pluralsight Web Application Penetration Testing: Client-side Testing course. Discover how to be proficient in performing client-side attacks like Cross-Site Scripting, HTML Injection, Client-si…
…
continue reading
1
Cyber Security Job Hunting with Owanate Bestman
30:52
30:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:52
How has the Covid-19 pandemic affected the employment prospects of cybersecurity professionals? In this episode, Owanate Bestman, the founder of Bestman Solutions, will share his take on what you need to know to stay employable in troubled times. Discover areas of growth in security, what employers are looking for, and what skills you’ll need in 20…
…
continue reading
1
Automated Security Compliance with Eric Martin
24:59
24:59
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
24:59
Do you have to comply with the complex, time-consuming, and tedious process of preparing for a security audit? In this episode, Eric Martin from Vanta, a cybersecurity startup, will discuss automated security and compliance. Discover why security compliance is essential, and how automation can help you with SOC 2 audits and HIPPA compliance require…
…
continue reading
1
Securing the Future of RPA with Alan Radford
32:44
32:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:44
Identity needs to be at the core of a security strategy. In this episode, Alan Radford, CTO of One Identity, will share how to achieve security by ensuring the right people get proper access to the right resources at the right time. Discover how using RPA can help with your identity and access management efforts. Listen now!…
…
continue reading
1
DevSecOps Blind Spots with Wilson Mar
29:12
29:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:12
Discover how to avoid blind spots in your DevSecOps with Wilson Mar. Wilson is a DevSecOps AI/ML leader, and in this episode, he’ll share his insights on how to improve security in your DevOps efforts. Listen in to find out more about tools, techniques and best practices in security.
…
continue reading
1
Cyber Security Tips and Virus Bombs with Greg Scott
29:28
29:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:28
Want to know a fun way to learn cyber-security tips? In this episode, Greg Scott security expert and author of Virus Bomb and Bullseye Breach will share how to pick up security practices by reading novels. Discover how to secure stuff like the bad guys do, and how to avoid security breaches in your applications.…
…
continue reading
1
Data Poisoning and Adversarial AI with Dr. Arash Rahnama
25:54
25:54
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
25:54
AI is everywhere, but have you ever thought about how it can impact security? Or how to test for AI-exposed security risks? In this episode, Dr. Arash Rahnama, head of Applied AI Research at Modzy, will share his views on the need for AI-embedded security and defenses. Discover how to avoid data poisoning, the emerging momentum around adversarial A…
…
continue reading
1
The Art of Network Penetration Testing with Royce Davis
26:38
26:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
26:38
Discover how to take over an enterprise network from the inside. In this episode, Royce Davis, author of "The Art of Network Penetration Testing: Taking over any company in the world", explains how a malicious invader can wreak havoc on your network and how to prevent it. Learn some foolproof penetration testing techniques, and the four phases that…
…
continue reading
1
Next Generation DevSecOps with Cindy Blake
25:49
25:49
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
25:49
Software development itself is changing rapidly, and security programs must evolve if they are to be effective in this next generation of software. In this episode, Cindy Blake, a Senior Security Evangelist at GitLab and author of 10 Steps Every CISO Should Take to Secure Next-Gen Software, will share what you need to know in these changing times. …
…
continue reading
1
Update: We'll be back soon (Life Happens)
1:10
1:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:10
Hey, it's Joe I just want to let you know that the Testing Security Testing podcast is still around. We're only away for a few weeks. We'll be back shortly. I have a bunch of awesome interviews lined up already. Stay tuned for the Art of Network Penetration Testing the interview I did with Royce Davis and his new book. I'm also doing an interview w…
…
continue reading
1
Talisman Security Testing with Harinee Muralinath
22:53
22:53
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:53
Don’t let your companies secrets accidentally get pushed to production and expose your company to security risks. In this episode, Harinee Muralinath, a Capability Lead, India at ThoughtWorks, and core contributor to Talisman, shares how. Talisman is a tool to detect and prevent secrets from getting checked-in in the first place. Discover how you c…
…
continue reading
1
Switching from QE to Product Security with Dwayne Thomas
23:33
23:33
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
23:33
Think of making the switch from your current role to cybersecurity? In this episode, Dwayne Thomas, a Cyber Security Consultant at Mentor$chip shares his journey from QE to Security. Discover how to enter the most in-demand field in the software industry and learn more about bug bounty programs, presenting security topics for Toastmasters, searchin…
…
continue reading
1
Cloud Security Myths with Vandana Verma
25:27
25:27
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
25:27
There are still lots of misconceptions and myths about Cloud Security. In this episode, Vandana Verma Global Board of Directors at OWASP and InfosecGirls shares her thoughts on cloud security. Discover some myth-busting truths about security and the cloud and how to avoid some common perceptions around cloud security. Listen up!…
…
continue reading
1
Ethical Hacking: Understanding Ethical Hacking with Dale Meredith
22:12
22:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:12
Ever wonder what it takes to become an ethical hacker? In this episode, Dale Meredith author of the Pluralsight course Ethical Hacking: Understanding Ethical Hacking shares some key takes aways from his course. Discover why Ethical Hacking is becoming a popular skill for security, what you need to know how to pass the Certified Ethical Hacker (CEH)…
…
continue reading
1
Challenges Implementing & Sustaining DevSecOps with Hasan Yasar
30:42
30:42
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:42
How do you define DevSecOps? Despite what some will lead you to believe, DevOps is not just a set of tools. In this episode Hasan Yasar Technical Director of Continuous Deployment of Capability group in Software Engineering Institute, CMU shares his thought on DevSecOps. Listen in to discover the common misconceptions and roadblocks, and how you ca…
…
continue reading
1
Penetration Testing of Identity, Authentication & Authorization with Prasad Salvi
21:08
21:08
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
21:08
Hackers are getting access to your sensitive data by exploiting web application vulnerabilities. Are you ready? In this episode, Prasad Salvi, author of the Pluralsight course Penetration Testing of Identity, Authentication and Authorization Mechanism, shares what you need to gain the ability to perform web application pen-testing. Listen in to dis…
…
continue reading
1
Getting Started with AppSec with Tanya Janca
42:15
42:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
42:15
Want to learn how to get started with Info Security, Application Security, and more? In this episode, Tanya Janca, Founder of SheHacksPurple, will share her thoughts on multiple security topics you need to know about. Discover some tips and resources to help jump-start your AppSec efforts. You’ll also hear about some cool initiatives like WoSec and…
…
continue reading
1
Professional Red Teaming with Joe Vest
29:31
29:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:31
Compliance, best practices, and regulation drive security programs. These programs pass audit and compliance checks, have robust patch management, and even conduct vulnerability and penetration testing assessments. How do you know if these programs can protect against real threats? In this episode, Joe Vest co-author of the book Red Team Developmen…
…
continue reading
1
Security and Certifications with Nancy Gariché
28:24
28:24
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:24
How necessary are certifications to your security testing career? In this episode, Nancy Gariché, Co-Founder at Secure That Cert shares her thoughts around certification, DevOps, DevSlop, and more. Discover a learning hack that will help you get a new job or stay up to speed in your current position. Listen up.…
…
continue reading
1
Android Application Security Testing with Marko Belzetski
26:19
26:19
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
26:19
Do you need to make sure your android applications are secure? In this episode, we'll be talking with Marko Belzetski all about Android Application Security Testing. Discover what it means to be a penetration tester of Web and Android applications, the differences between Android and iOS, and why the OWASP ASVS and MASVS are some of the most useful…
…
continue reading
1
How to Win over that Elusive Developer with Adhiran Thirmal
32:16
32:16
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:16
Are you struggling to get your developers on board with your security testing efforts? In this episode, we talk with Adhiran Thirmal all about how to win over that elusive developer. Discover the key to implementing a successful application security testing program to buy-in from your developers, DevOps, and architects.…
…
continue reading
1
Do Your Pipelines Remember with James Rabon
19:30
19:30
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
19:30
…
continue reading
1
Browser Exploitation Framework (BeEF) with Gavin Johnson-Lynn
28:43
28:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:43
…
continue reading
1
Securing DevOps: Security in the Cloud with Julien Vehent
30:18
30:18
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:18
…
continue reading
1
HackEdu: Hands-On Security Training with Arthur Hicken & Jared Ablon
30:34
30:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:34
…
continue reading
1
Hacker Tools and Skills For Security Testers with Jahmel Harris
31:12
31:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:12
…
continue reading
1
Metasploit Pen Testing with Keith Watson
31:31
31:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:31
…
continue reading
1
Security in DevOps Like a Boss with Tanya Janca
35:38
35:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:38
…
continue reading
1
Understanding the Most Common Secure Coding Standards with Arthur Hicken
25:31
25:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
25:31
…
continue reading
1
Test Your WAF and Make it Your Friend with Franziska Buehler
22:20
22:20
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:20
…
continue reading
1
How to Security Test Your APIs with Troy Hunt
29:30
29:30
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:30
…
continue reading
1
Developers are Taking Over Application Security with Jeffrey Martin
28:48
28:48
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:48
…
continue reading
1
Shift-Left Security Testing with Kevin E. Greene
41:18
41:18
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:18
…
continue reading