Episode 33 - IoT Security Failures Strike Again, This Time A Fish Tank
Release Date: 07/26/2017
Security In Five Podcast
This episode talks about a service offered by many called vCISO or Virtual Chief Information Security Officer. If you are a small business without a security team a vCISO is available solution to help you build that security foundation.
info_outlineSecurity In Five Podcast
This episode talks about a situation at Telsa that led to a new employee's termination and Tesla suing them in court. Reflecting on lessons learned about onboarding, least privilege and use of personal services in a corporate environment.
info_outlineSecurity In Five Podcast
This week's tools, tips and tricks covers Azure AD Investigator. FireEye Mandiant released this tool as open source in response to the SolarWinds.
info_outlineSecurity In Five Podcast
Last year, 2020, we saw an increase of Common Vulnerabilities and Exposures (CVEs) reported from 2019. What's interesting is the time of the year that most were reported. This episode talks about why that could have been.
info_outlineSecurity In Five Podcast
Eventually, you will be part of a breach. You will get a letter from your clinic or an email from a website you use that your credentials were compromised. This episode talks about what you shouldn't do if you get one of the see notices and why it could make things worse.
info_outlineSecurity In Five Podcast
Believe it or not businesses still use fax machines to transmit data. This episode talks about the security gaps you have to be aware of if you use fax machines.
info_outlineSecurity In Five Podcast
This podcast has a supporting blog at SecurityInFive.com. The blog is where you can find every single podcast episode as well as the content I have written over the years. This episode details how between now and June 30, 2021 I am opening the blog to guests posts at no cost to you.
info_outlineSecurity In Five Podcast
Ring is rolling out end-to-end encryption to their products. This episode talks about what this means and how it works.
info_outlineSecurity In Five Podcast
Thinking like a hacker can help you protect yourself. This episode talks about the questions hackers ask before they attack a target.
info_outlineSecurity In Five Podcast
Security researchers reported they were able to clone Google's Titan Security Key. The Titan is a hardware device to greatly improve multi-factor authentication. This episode talks about how the researchers were able to clone it and why you shouldn't be too worried about this or stop using your Titan keys.
info_outlineInternet of Things is a craze to get everything on the Internet. However the rush to build has left security practices behind. Time and time again it's shown that IoT poses a security risk for everyone. This episode talks about how a fish tank almost got a casino hacked.
Be aware, be safe.