Security In Five Podcast
This week's tools, tips and tricks covers Azure AD Investigator. FireEye Mandiant released this tool as open source in response to the SolarWinds.
info_outlineSecurity In Five Podcast
Last year, 2020, we saw an increase of Common Vulnerabilities and Exposures (CVEs) reported from 2019. What's interesting is the time of the year that most were reported. This episode talks about why that could have been.
info_outlineSecurity In Five Podcast
Eventually, you will be part of a breach. You will get a letter from your clinic or an email from a website you use that your credentials were compromised. This episode talks about what you shouldn't do if you get one of the see notices and why it could make things worse.
info_outlineSecurity In Five Podcast
Believe it or not businesses still use fax machines to transmit data. This episode talks about the security gaps you have to be aware of if you use fax machines.
info_outlineSecurity In Five Podcast
This podcast has a supporting blog at SecurityInFive.com. The blog is where you can find every single podcast episode as well as the content I have written over the years. This episode details how between now and June 30, 2021 I am opening the blog to guests posts at no cost to you.
info_outlineSecurity In Five Podcast
Ring is rolling out end-to-end encryption to their products. This episode talks about what this means and how it works.
info_outlineSecurity In Five Podcast
Thinking like a hacker can help you protect yourself. This episode talks about the questions hackers ask before they attack a target.
info_outlineSecurity In Five Podcast
Security researchers reported they were able to clone Google's Titan Security Key. The Titan is a hardware device to greatly improve multi-factor authentication. This episode talks about how the researchers were able to clone it and why you shouldn't be too worried about this or stop using your Titan keys.
info_outlineSecurity In Five Podcast
A fired healthcare worker used a secret account to cause havoc after he left. This episode talks about the controls you can put in place to help detect behavior like this and how looking at data with proper business context can help you protect it better.
info_outlineSecurity In Five Podcast
This week's tools, tips and tricks talk about password generation per NIST recommendations and best practices.
info_outlineWhat a year and I think we are glad it's finally over.
This is the last episode for the year. A big thank you to all of you and a discussion on how hackers can use personal information to scare you into paying them. Don't fall for it.
Be aware, be safe.
Primary Partner - WeHackPurple.com
Become A Patron! Patreon Page
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Security In Five Podcast Page - Podcast RSS
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - bblogger@protonmail.com