Download the App!
show episodes
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

Unsubscribe
Unsubscribe
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Loading …
show series
 
In our March episode, the LiveSecurity analyst team discusses two months worth of InfoSec news during our Security Story of the Month segment. We cover new weaknesses in a cipher associated with SSL and TLS, more zero day Java exploits, a severe sentence in a cyber security trial, the largest DDoS attack ever seen, and more. We also debut a funny, …
  continue reading
 
During this month's Security Story of the Month segment the LiveSecurity analyst team discusses the biggest InfoSec stories from January. Topics include wide-spread Java zero days, a nasty new advanced malware campaign called Red October, some industry-wide Universal Plug and Play vulnerabilities, and much more. Also stay tuned for What's Up With W…
  continue reading
 
Last episode, we reviewed our 2012 security prediction results. This time we unveil WatchGuard's 2013 security predictions. They cover topics like life-threatening hardware hacks, mobile device pick-pockets, cyber strike-back, zombie browsers, and much more. Whether or not these predictions come true, the episode explores many real infosec trends t…
  continue reading
 
We're nearing the end of the year, which means it's prediction time. In the first of two special episodes, the Radio Free Security team looks back at our 2012 security forecasts. Did our predictions for the year ring true, or were they epic fails? Join Corey Nachreiner and the co-hosts from the Security Story of the Month to find out. The discussio…
  continue reading
 
In October's Security Spotlight, Ben Brobak and Corey Nachreiner unveil the secret culprit for most security breaches. More importantly, they discuss firewall policy best practices that will help you avoid such breaches. Also, learn about WatchGuard's new RapidDeploy capability in an interview with Product Manager, Johnni Aguirre. Finally, we discu…
  continue reading
 
Digital network attacks that can blow up generators, shut down power grids, or damage nuclear facilities seem like the stuff of science fiction. However, we currently live in a world where nation-states launch just such attacks against one another, and may escalate them in the future. In this episode, Nachreiner interviews an industry expert from A…
  continue reading
 
August's abbreviated episode includes an exciting Security Story of the Month segment and a trip down memory lane, with the Tip-o-matic 650. In this month's security news recap, Richard Gilmour, Christian Garland, and Corey Nachreiner highlight the most concerning security stories and incidents from August. The segment includes a new advanced persi…
  continue reading
 
In July's Security Spotlight, guest host Ben Brobak interviews Corey Nachreiner about the most interesting briefings he attended at this year's Black hat security conference. They discuss the implications of some of these new threats and share security tips along the way. This episode's "Security Story of the Month" also shares a Blackhat and Defco…
  continue reading
 
Ben and Corey discuss the Flame worm in this month's Security Spotlight. What does this malware do, how does it spread, and how can you protect yourself from this type of advanced attack. They also discuss the evidence suggesting that Flame is a government sponsered cyber attack, and what that means for the future of network and information securit…
  continue reading
 
In this month's Security Spotlight, Corey and Peter discuss Application Control; What is it? What can you do with it? And how do you get started? Learn how this powerful new security tool can increase your network visibility and control tenfold. Next, learn about the latest industry news during the "Security Story of the Month." Richard, Chris, and…
  continue reading
 
In this month's Security Spotlight, Corey chats with WatchGuard's Director of Product Management about the history of virtualization and its security ramifications. He also learns about WatchGuard's upcoming virtual security solutions. Next, listen in on the "Security Story of the Month," where Christian, Chris, and Corey talk about cyber legislati…
  continue reading
 
In this episode, we return to our regular format. During the first segment, Corey interviews guest expert, Dean Colpitts, to discuss practical ways IT administrators can manage and secure Mobile devices. Next up? The return of "The Security Story of the Month". Tim, Richard, and Corey explore three big security stories from the month, and decide wh…
  continue reading
 
Last episode we looked back at WatchGuard's 2011 security predictions. Now it's time to look towards the future. Do you know what security threats and trends you should expect this year? If not, join Corey Nachreiner, Ben Brobak, and Tim Helming to find out. We'll cover many topics, from malware on app stores, to power plants with viruses. We'll al…
  continue reading
 
Radio Free Security returns after two years radio silence! In this episode, Corey Nachreiner looks back at WatchGuard's 2011 security predictions with Tim Helming and Ben Brobak, to see how well - or how badly - we did. Topics covered include, Cyberwar, APTs, Facebook links, and more. Did we call the year correctly, and what did we learn from the r…
  continue reading
 
In this double dose of Radio Free Security, Senior Network Security Analyst Corey Nachreiner, CISSP, and WatchGuard Trainer Nathan Buff talk about two months worth of security stories. Topics include; the latest zero day exploits, security problems plaguing Facebook, the latest Conficker updates, and the BBC's questionable use of a malicious botnet…
  continue reading
 
In the inaugural 2009 episode of Radio Free Security, Senior Network Security Analyst Corey Nachreiner, CISSP, and WatchGuard Trainer Nathan Buff talk about a huge industry data breach, a fast spreading worm with potential to become a botnet, and a broken cryptographic hash function. Nat Hillary, a Product Manager for WatchGuard, shares the top ten…
  continue reading
 
Senior Network Security Analyst Corey Nachreiner, CISSP, and Information Security Analyst Scott Pinzon, CISSP, host their second annual Security Predictions episode. They assess and score the six predictions they made in December 2007 about 2008; issue several predictions of what will NOT happen in 2009; and predict six new trends to anticipate thi…
  continue reading
 
Senior Network Security Analyst Corey Nachreiner, CISSP, details the happy results of Internet Service Providers (ISPs) shutting down McColo.com, but he questions the methods used. Danny McPherson, Vice President and CSO of Arbor Networks, discusses some surprising findings in his annual Worldwide Infrastructure Security Report, which details what …
  continue reading
 
WatchGuard trainers answer a network administrator's question about how to lock down a high school's network. Greek researcher Elias Athanasopoulos explains how social networking sites such as Facebook could be easily transformed into "Facebots" that sustain Denial of Service attacks against targets on the Web. WatchGuard introduces a new wireless …
  continue reading
 
Dave Piscitello, Senior Security Technologist for ICANN and a member of the Anti-Phishing Workgroup (APWG), describes how scam artists utilize second-level domain names to make it harder for authorities to take down scam web sites. Mark Waldstein and Scott Pinzon, CISSP, discuss security trends, including a TCP/IP stack vulnerability rumored to pot…
  continue reading
 
In his Security Story of the Month, Corey Nachreiner, CISSP, describes the compromise of Best Western Hotels in Germany, and why it is not "the greatest cyberheist in history," as the Glasgow Sunday Herald claimed. Mark Waldstein joins the show and discovers the Tip-O-Matic, which dispenses tips on EULAs, backups, and security by obscurity. The wor…
  continue reading
 
In this month's episode, VP of Marketing Eric Aarrestad discusses WatchGuard's roadmap in the coming year - the release of XTM, or "Extensible Threat Management" products. Also, Tech Support Team Lead Ben Brobak returns to answer the latest hot-potato questions coming into our Support call center.By WatchGuard LiveSecurity Service
  continue reading
 
Two disgruntled men figured prominently in the news last month. Corey Nachreiner, CISSP, considers what lessons we can learn from engineer Terry Childs, who locked the City of San Francisco out of its own multi-million-dollar fiberWAN network. The CyberCrime Diaries segment answers the question, "Why don't the authorities stop cybercriminals?" by r…
  continue reading
 
In this month's episode, Radio Free Security's Scott Pinzon and Corey Nachreiner, both CISSPs, analyze the recent news of a potential "DNS cache poisoning" scare. They explain what it is, and how Firebox admins can counteract it. Then, Tech Support Team Lead Ben Brobak discusses the finer points of getting VPN tunnels going, and keeping them alive.…
  continue reading
 
In his Security Story of the Month, Corey Nachreiner, CISSP, briefly touches on several topics, including hackers taking over a server related to Citibank; poor disclosure at online catalog company Wards; and an embarrassing hijacking of web sites belonging to IANA and ICANN. In Part 2, Corey explains why everyone should worry about two new Apple O…
  continue reading
 
In this month's episode, Ian Kilpatrick of England's Wick Hill Group discusses how Europe is setting the pace for technology that is environmentally responsible - and how WatchGuard's UTM products lead the way. Also, Sandra Takeuchi introduces the new task-based Current Help pages on our web site, and technical trainer Matt Sando explains the diffe…
  continue reading
 
In this month's episode, we take a deep dive into Report Manager, which was completely redesigned in Fireware Version Ten. We'll hear three perspectives on it -- from Product Manager Steve Fallin, Principal Developer Mark Hughes, and Technical Support Rep Greg Gilbraith. Find out why it was changed, and get tips on how to use the new version. Plus,…
  continue reading
 
Corey Nachreiner, CISSP, demystifies the workings of attacks that make legitimate web sites serve malicious software to their customers. Topics explained include SEO poisoning (sometimes called "Google cache corruption"); iFrames; and SQL injection performed against Active Server Pages. Professional hacker Johnny Long shares how his latest book hel…
  continue reading
 
This month, we tackle one big topic: Helping you navigate the LiveSecurity web site. What are the key resources to help LiveSecurity subscribers use our products, and where exactly are they located? Radio Free Security's host Scott Pinzon, CISSP, crosses over to the Firebox Special to give us the scoop on product documentation, broadcast preference…
  continue reading
 
A Very Special Episode: Welcome Newbies! This month's program is dedicated to new IT personnel who want to learn network security, but have almost no money or time. Fred Avolio, one of the inventors of the commercial firewall, recommends indispensable must-reads, the best conferences, forums to sign up for, and more. A mock quiz show, "The Network …
  continue reading
 
Online safety consultant and "white hat stalker" Linda Criddle of Look Both Ways describes how predators can grab information you thought was private. Scott Pinzon, CISSP, and Corey Nachreiner, CISSP, discuss alarming new trends in bots, including the "MayDay" botnet. Wireless network experts Lisa Phifer of Core Competence and Diana Kelley of Secur…
  continue reading
 
In this episode, we introduce a brand-new appliance, the WatchGuard SSL VPN. Training expert Kyle Porter explains Single Sign-On authentication, a new feature in Version 10. Sales engineer Pete Adams describes how System Manager can be used when you have many different Fireboxes on your network. And we announce the winner of our Listener Mailbag co…
  continue reading
 
A mysterious attack placed trojans on over 10,000 legitimate web sites, causing them to distribute malware to their customers. How was it done? Corey Nachreiner, CISSP, reports. Chris Squier, CISSP, gives practical advice on how to make sure your network complies with every regulation, legislation, and industry standard relevant to your organizatio…
  continue reading
 
Scott Pinzon, CISSP, and Corey Nachreiner, CISSP, predict six developments in network security during 2008, covering topics such as international cyberwarfare, IPv6 adoption, OS X security, botnet trends, and more. Christopher Smith, WatchGuard Sales Engineer, explains what specific settings do to enhance security when using the Firebox's HTTP prox…
  continue reading
 
Corey Nachreiner, CISSP, interviews UK security pro Steve Huddleston about Her Majesty's Revenue and Customs losing two disks containing PII for 25 million UK citizens. Steve Fallin, Director of WatchGuard's Rapid Response Team, shows off his holiday modifications to the Tip-O-Matic, a machine that dispenses security advice stamped on ping pong bal…
  continue reading
 
Corey Nachreiner, CISSP, details the evolution of the Storm botnet from low threat to state-of-the-art malware. Google hacker Johnny Long explains the concept behind his latest book, No-Tech Hacking. Steve Fallin, Director of WatchGuard's Rapid Response Team, debates SMTP egress filtering with Dave Piscitello, ICANN Fellow. Dave describes overlooke…
  continue reading
 
Gary Hinson, CEO of Isect Ltd. In New Zealand, explains how to transform your organization so that all network users have a "security aware culture." Three short "Closetful of Clutter" segments explain how to get a free firewall, a free security book from Syngress, and a free video showing how botnets work. Concluding the Black Hat report, Rob Grah…
  continue reading
 
Our recap of Black Hat 2007 includes a report by network security analyst Corey Nachreiner on the Estonian cyber-riot, including what techniques worked for the attackers and what worked for the defenders. Steve Fallin interviews David Thiel, a researcher who has found numerous attack vectors in media files and media players formerly regarded as "ha…
  continue reading
 
Dave Piscitello, a fellow of the ICANN Security and Stability Committee, explains how criminals use DNS fast flux techniques to make illegal web sites difficult to trace and shut down. Then, in a session recorded at Black Hat 2005, network security leaders debate whether cyberterrorists could actually shut down US infrastructure. Participants inclu…
  continue reading
 
Network security professionals discuss the persistent Distributed Denial of Service attack that plagued Estonia for over two months, and the sudden attack on 10,000 Italian web sites. Corey Nachreiner, CISSP, explains Mpack, a dangerous new tool bot masters will love. Veteran network administrator Steve Fallin shares his favorite 10 web sites for k…
  continue reading
 
Corey Nachreiner, CISSP, reports on his findings after purposely letting bot nets infect his test network. Veteran technologists discuss security tactics and tips, including: reduced user rights and privileges; egress filtering; strategies for what to log; blocking unwanted outbound traffic using a DNS proxy, and more. Also: answers to questions fr…
  continue reading
 
Veteran network administrator Steve Fallin decodes the strange dialect of marketing copy, then gives practical tips on how to get the right technology product on the first try. Corey Nachreiner, CISSP, examines the disturbing rise of zero-day security flaws in popular software. WatchGuard Product Manager Tim Helming provides an overview of cool new…
  continue reading
 
Corey Nachreiner discusses the odd backstory behind last month's gargantuan patch of 45 vulnerabilities in Apple's OS X. In the Feedback segment, Scott Pinzon highlights upcoming free security training videos, and listeners question advice from the previous episode. In the final segment, Steve Fallin outlines WatchGuard's four-point plan for stoppi…
  continue reading
 
LiveSecurity Editor-in-Chief Scott Pinzon, CISSP, interviews network security analyst Corey Nachreiner about threats emerging from February. Covered: drive-by pharming, Distributed Denial of Service attacks, and Microsoft Office zero-day vulnerabilities. In the Feedback segment, a listener learns how to get more robust SMTP reports from the Firebox…
  continue reading
 
The inaugural episode of Radio Free Security! LiveSecurity Editor-in-Chief Scott Pinzon interviews network security analyst Corey Nachreiner about emerging threats from January. Covered: Flaws in Cisco IOS; the misnaming of the Storm Worm; and the Month of Apple Bugs. In the Foundations segment, former penetration tester Steve Fallin explains in la…
  continue reading
 
Loading …

Quick Reference Guide