Best Atomicorp podcasts we could find (Updated March 2019)
Related podcasts: Waf Scottshinn Mikeshinn Linuxsecurity Endpointprotection Cybersecurity Tech  
Atomicorp public [search 0]
×
Join millions of Player FM users today to get Atomicorp news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
The Linux Security Podcast covers key concepts in security, reviews some of the latest exploits and discusses the tools enterprises use to detect, prevent and recover from cyber attacks. The show features insights from Mike Shinn, co-founder and CEO of Atomicorp, and Scott Shinn, co-founder and CTO of Atomicorp as well as PM for OSSEC. Scott was also chief network manager at the White House and interim CISO at the Department of the Interior earlier in his career. Mike contributed to the firs ...
 
Loading …
show series
 
Red Teams have become a common tool for testing enterprise security. They attempt to penetrate security defenses as if they were hackers with nefarious intent. Atomicorp's Mike Shinn comments that bad security is almost always the result of limited imagination. Red teams are motivated to be creative and determine the best way to circumvent secu ...…
 
Why do hackers hack into your networks and devices? Many people think it's for credit card data, other PII or to steal intellectual property. This is sometimes true, but there are many other reasons as well. What you value about your enterprise assets is often different from what hackers value. More and more we are seeing hackers break into net ...…
 
Virtual patching is a way of implementing a security policy to eliminate or mitigate a security vulnerability. It is not actually patching, thus the name virtual. It is a way to do something very quick and external to the application and it is not used nearly enough in cybersecurity defense. Why not just use a patch? Sometimes there is no patch ...…
 
SQL Injection Attacks are a method for taking advantage of flaws in the way an application is written. In particular, they exploit vulnerabilities that offer direct access to databases. Mike Shinn, CEO of Atomicorp, has employed SQL injections in Red Team exercises and built countermeasures that defend against them. In this week's episode Shinn ...…
 
The Common Vulnerabilities and Exposures (CVE) system is a critical tool for the cybersecurity industry. CVEs provide consistency in naming and clarity on the nature and impact of various vulnerabilities. In this week's Linux Security Podcast, Atomicorp CEO Mike Shinn discusses the origin and management of the CVE process, how it's used by cybe ...…
 
The Efail vulnerability has been in the news lately and has many people rushing to remove encryption from their email clients. The vulnerability does impact S/MIME and PGP users, but only a subset of them. That means a lot of people are removing encryption from their email unnecessarily and putting themselves at risk. Atomicorp CEO and long-tim ...…
 
OSSEC was founded in 2004 and received its most recent update to 3.0 in April 2018. It is an open source project for cybersecurity and delivers the most robust endpoint detection and response capabilities available to enterprises today. OSSEC PM Scott Shinn discusses the history of of the project, the core features and how it differs from comme ...…
 
Equifax was the victim of one of the highest profile hacks in history. More than 147 million people's financial data was exposed. Surprisingly, the Equifax CEO blamed the entire incident on a single engineer failing to patch a known vulnerability in Apache Struts. Anyone versed in security knows this scapegoating is ridiculous. The Struts vulne ...…
 
Web application firewalls (WAF) are a specialized form of firewall designed to protect applications from internet-based attacks. Firewalls must be lightweight to ensure people can quickly get onto the internet and data can be returned, but WAFs are much more sophisticated. They need to interact with data coming from the web server and the user ...…
 
Logging is important for at least two reasons. Engineers need to know what is going on so they can figure out if something bad is happening and fix it. Bigger companies also have the need to capture logs to comply with a variety of regulations and business compliance requirements. SIEM has become popular for log aggregation and visualization bu ...…
 
The Meltdown and Spectre vulnerabilities took the security industry and the chip market by surprise. Many people are characterizing these vulnerabilities as flaws in microprocessor design, but the choice was intentional to increase data processing speed. It just wasn't contemplated as an attack vector. Essentially all mobile devices are at risk ...…
 
File Integrity Monitoring is designed to notify you when files have changed on a system. It was one of the very first security detection capabilities in existence and is almost as old as passwords. FIM has also been incorporated into many regulatory and security protocols. Mike Shinn breaks down the core elements of FIM, how it evolved, where i ...…
 
A Brute Force Attack is one of the oldest cyber attacks. It was even featured in the 1980's thriller, War Games. In this episode, Mike Shinn walks through how a Brute Force Attack works, reviews some different flavors of attacks and how to defend against them.
 
Google login Twitter login Classic login