Episode 797 - New Tool Helps You Find Shadow Admin Account In AWS and Azure
Release Date: 07/30/2020
Security In Five Podcast
Google has been served a class action lawsuit for a bait and switch type move with Google Workspace early adopters. This episode talks about what the lawsuit it and rants about it because your host is one of the early adopters. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
A recent study by a firm called ExtraHop revealed that over 60% of IT environments analyzed has SSH ports exposed. Additional research shows that many less than secure ports and protocols are left open, allowing more vectors for attackers to probe. This episode breaks down what those were and how you can get a handle on these in your environment. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The Cybersecurity and Infrastructure Security Agency (CISA) released a report of the top malware strains of 2021. This episode talks about what reports like this are valuable to your continuing education as a cybersecurity professional. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
New research shows that almost 90% of ransomware delivery is done through office macros. This ties into the move by Microsoft to block all macros by default in their Office products. This episode breaks it down. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Security researchers have discovered thousands of mobile apps that are leaking API keys. This episode talks about how this is more of a problem than this shows and why it's happening. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Phishing campaigns and attacks are constantly changing. A new credential stealing phishing campaign has been spotted in the wild. This episode talks about what it is and how you can help protect against it. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
This episode talks about some exciting news for the Security In Five and your host's new roles. Cloud Security Alliance of MN - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The HIPAA Security Rule is a supportive rule to HIPAA focused on more of the technical security aspects of the privacy rule. NIST released an updated draft of a guide to help people understand and implement controls for the security rule. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
A Virtual Private Network (VPN) should be part of your personal security practice. This episode talks about the additional benefits you can get by regularly using one. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
One of the biggest lottery jackpots is drawn tonight. This episode talks about some of the things you should do to protect your privacy if you win. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineCyberArk released a new tool for AWS and Azure to help you find Shadow Admin accounts. This episode talks about how the tool works and why you should use it on your cloud environments regularly.
Be aware, be safe.
Become A Patron! Patreon Page
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Security In Five Podcast Page - Podcast RSS
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - [email protected]