Blue Security artwork

Blue Security

204 episodes - English - Latest episode: 4 days ago - ★★★★★ - 3 ratings

A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.

Technology
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Security News Edition: Lockfile, Razer, and T-mobile

August 30, 2021 02:41 - 32 minutes - 36.6 MB

This week on the Blue Security Podcast, Adam and Andy breakdown some of the latest infosec news. They go over some hardening advice on the current Exchange ProxyShell vulnerability and Lockfile's current ransomware campaign. They also discuss some interesting privileged escalation using Razer peripherals. Finally, they give their thoughts on the T-Mobile breach. ------------------------------------------- Youtube Video Link: https://youtu.be/vI3RRekjPcY -----------------------------------...

Windows Hello for Business

August 23, 2021 02:44 - 35 minutes - 40.1 MB

This week on the Blue Security Podcast, Adam and Andy discuss the enterprise-ready passwordless solution that's already built into your Windows 10 PCs. If your business-class PCs have a TPM, you have  everything you need to get started. Listen as Adam and Andy explain how  WHFB works, how to address privacy concerns, and how to quickly stand up  a POC or Pilot. ---------------------------------------------- Youtube Video Link: https://youtu.be/XK8BmcOSdco ---------------------------------...

Mistakes that hinder a security team's success with Special Guest Nate Gardner

August 16, 2021 02:42 - 19 minutes - 20.8 MB

This week, Nate Gardner joins Andy to talk about mistakes that security teams can make that will hinder their success at organizations. And these aren't technical errors. Listen in because these mistakes can mean the difference in getting a tool or policy deployed! ---------------------------------------------- Youtube Video Link: https://youtu.be/YsqCpVPpVII ---------------------------------------------- Documentation: https://www.darkreading.com/edge/theedge/5-mistakes-that-impact-a-s...

Secure Privileged Access

August 09, 2021 01:36 - 45 minutes - 50.3 MB

This week, Adam and Andy go through Microsoft's best practice on securing privileged access. This documentation is amazing and extremely detailed. There are some great tips including administration and secure device management. ---------------------------------------------- Youtube Video Link: https://youtu.be/Mmg4ob-6u08 ---------------------------------------------- Documentation: https://docs.microsoft.com/en-us/security/compass/overview https://techcommunity.microsoft.com/t5/azure-...

Windows Defender Application Guard

August 02, 2021 01:20 - 22 minutes - 25.7 MB

This week, Adam and Andy continue their series on Windows security by talking about Windows Defender Application Guard. This is a great security feature in Windows 10 that isolates the browser in a hypervisor container. Listen in on the details and how to deploy it! ---------------------------------------------- Youtube Video Link: https://youtu.be/5ZbYWCrlhR8 ---------------------------------------------- Documentation: https://docs.microsoft.com/en-us/windows/security/threat-protectio...

Pegasus, Twitter MFA, & Underfunding Infosec

July 25, 2021 21:46 - 30 minutes - 31.8 MB

This week, Adam and Andy discuss some interesting articles that were published during the week. Pegasus, a suite of mobile phone exploits, was big in the news again. Twitter released a report on their MFA adoption. And an interesting post on Linkedin from a cybersecurity strategist spurred some discussion on underfunding cybersecurity as a strategy. ---------------------------------------------- Youtube Video Link: https://youtu.be/NdPrbfLaEV8 ---------------------------------------------...

CISA's RVA findings and what it means for organizations

July 19, 2021 02:57 - 50 minutes - 53.4 MB

This week, Adam and Andy go over CISA's (Cybersecurity & Infrastructure Security Agency) Risk and Vulnerability Assessments finding for 2020. In CISA's report, there were data driven values for different vectors of attack mapped to the MITRE ATT&CK framework. CISA had many recommendations for mitigation that Adam and Andy talk through. ---------------------------------------------- Youtube Video Link: https://youtu.be/V6LAgb4KvFI ---------------------------------------------- Documentati...

The Tech We Use

July 12, 2021 03:28 - 42 minutes - 45.9 MB

This week, Andy and Adam take a break from cybersecurity and have a little fun talking about the tech they use. They chat about their phones, computers, headphones, mics, and more! Below are links to the products they talk about. Note: This show is not sponsored. All items are purchased through personal means. ---------------------------------------------- Youtube Video Link: https://youtu.be/6Jq8v3aTM-A ---------------------------------------------- Documentation: Unifi: https://ui.com...

Information Protection with Special Guest Rachel O'Shea

July 05, 2021 01:45 - 44 minutes - 38.5 MB

This week, Rachel O'Shea, a Senior Technical Specialist in Compliance at Microsoft, join Adam and Andy to talk about information protection and governance. Rachel has a wealth of experience in compliance and she talks about some of the tools within Microsoft's suite to help protect information as well as tips to get started and continuous re-evaluation of your compliance program.  ----------------------------------------------  Youtube Video Link: https://youtu.be/vet3BKiKEQQ  -----------...

Should you block or allow this app?

June 28, 2021 03:36 - 34 minutes - 35.4 MB

This week, Adam and Andy talk about what infosec professionals should consider when being asked to block or allow an application. ---------------------------------------------- Youtube Video Link: https://youtu.be/Y8W5LSVpa4M ---------------------------------------------- Documentation: https://www.wired.co.uk/article/blackberry-india ---------------------------------------------- Contact Us: Website: http://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Instagram...

Special Episode - Programming Note

June 21, 2021 14:00 - 5 minutes - 5.45 MB

Adam and Andy have some news to share!

Windows Defender Credential Guard

June 21, 2021 02:39 - 27 minutes - 27.3 MB

This week, Adam and Andy do a deep technical dive on Windows Defender Credential Guard. This security feature is part of Windows 10 Enterprise and not as broadly deployed as it should be. Learn what it is, how it works, and why you should have this on your roadmap to enable. ----------------------------------------------  Youtube Video Link: https://youtu.be/AQsxdW_iYlU ----------------------------------------------  Documentation: https://docs.microsoft.com/en-us/windows/security/ident...

The True Cost of Ransomware

June 14, 2021 01:21 - 34 minutes - 42.1 MB

This week, Adam and Andy talk about how cyberattacks and ransomware incidents are increasing in  frequency and how the financial impact is getting greater both for  payments and for recovery. They go over the sometimes hidden costs of a  ransomware attack that security practitioners should be aware of to plan  and budget for. ---------------------------------------------- Youtube Video Link: https://youtu.be/RB-ujlVfjfU ---------------------------------------------- Documentation: https...

Digital Every Day Carry (EDC)

June 07, 2021 00:30 - 42 minutes - 44.7 MB

This week, Adam and Andy talk about their digital "Every Day Carry" (EDC). These are tools they use personally on an every day basis to keep themselves and their data safe. They go through each tool and why they use it from phones, to browsers, to what social media accounts they keep. If you have other tools that are interesting that you use, be sure to contact the show and let us know! ---------------------------------------------- Youtube Video Link: https://youtu.be/df2Jd1gCupg -------...

That Infosec Op-Ed

May 31, 2021 18:27 - 45 minutes - 47.1 MB

This week, Adam and Andy talk about the op-ed written by Prof Allen Gwinn in The Hill that had the information security community up in arms. They counter his article in a thoughtful way because while many of his ideas are ultimately bad ideas, there are some nuggets of good ideas in there. And at least he got the infosec community talking and doing some self-reflection. Listen in on a balanced counter argument to his op-ed article. ---------------------------------------------- Youtube Vi...

Information Security Leadership with Special Guest Doug Turecek

May 24, 2021 02:00 - 41 minutes - 32.7 MB

This week, Adam and Andy talk with Doug Turecek. Doug has over 25 years of experience in information technology and is currently the Information Security Officer for Exact Sciences. They talk about what it's like to be a senior leader in information security including managing budgets, managing people, and managing expectations from other leaders in the business. If you're in leadership now or considering moving up the corporate ladder in information security, this is the episode for you! -...

Colonial Pipeline and other news

May 17, 2021 01:52 - 33 minutes - 38 MB

This week, Adam and Andy talk about the Colonial Pipeline ransomware incident, the executive order President Biden signed on improving cybersecurity, and what infosec professional want to think about when it comes to their own defense and response to a ransomware incident. ---------------------------------------------- Youtube Video Link: https://youtu.be/OreXgsMp0Xs ---------------------------------------------- Documentation: Cyberspace Solarium Commission: https://www.solarium.gov/ ...

Security Change Management

May 10, 2021 02:05 - 35 minutes - 39.8 MB

This week Andy and Adam talk about security change management. Rolling  out a security change or a new security product can be difficult and  stressful if not done correctly. It's important to communicate those  changes for a smooth user experience. Listen in on tips that Andy and  Adam have learned throughout their careers. ---------------------------------------------- Youtube Video Link: https://youtu.be/pNmb0wINY3I ---------------------------------------------- Contact Us: Website: ...

Browser Security

May 03, 2021 02:49 - 41 minutes - 47.2 MB

This week Andy and Adam talk about browser security. They break down why it's important to secure your browser's configuration and recommendations on settings for Edge, Chrome, and Firefox. They also dive into some thoughts on privacy and advertising data/telemetry. ---------------------------------------------- Youtube Video Link: https://youtu.be/rJrQrzlZaH4 ---------------------------------------------- Documentation: CISA Guidance: https://us-cert.cisa.gov/publications/securing-your...

Mentorship with Special Guest Matt Wood

April 26, 2021 00:26 - 36 minutes - 27.4 MB

This week Andy and Adam chat with Matt Wood. Matt is an information security manager who was Andy's first mentor in infosec. They talk about the importance of mentorship, what the relationship is like, and how to go about finding a mentor. ---------------------------------------------- Youtube Video Link: https://youtu.be/VQeiA0b8WPs ---------------------------------------------- Documentation: Matt Wood LinkedIn: https://www.linkedin.com/in/matthewwood/ Twitter: https://twitter.com/m...

M365 Productivity Tips and Tricks

April 19, 2021 02:46 - 33 minutes - 35.2 MB

This week, Adam and Andy take a break from security and give you their favorite tips and tricks for the M365 Suite. Hopefully you learn something and we'd love to hear your tips and tricks! Email us or send us a DM on Twitter. ---------------------------------------------- Youtube Video Link: https://youtu.be/iwpcXOZYZfo ---------------------------------------------- Contact Us: Website: http://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Instagram: https://www.ins...

Zscaler Security with Raja Khalid

April 12, 2021 02:15 - 39 minutes - 38.9 MB

This week, Adam and Andy chat with Raja on Zscaler, one of our favorite tools when it comes to DNS security (and more!). Zscaler is a scalable security tool that performs category and reputation filtering. It also does advance threat protection, malware sandboxing, DLP, CASB, and a unique take on VPN. ---------------------------------------------- Youtube Video Link: https://youtu.be/T1Rudo8mXss ---------------------------------------------- Documentation: Raja Khalid Email: rkhalid@zs...

Mac Management with Special Guest Matthew Ward and Matt Benyo

April 05, 2021 02:00 - 56 minutes - 54.5 MB

This week, Adam and Andy are joined by Matthew Ward and Matt Benyo to talk about Mac Management. Macs are more and more important in enterprises and getting a hold on how to manage them instead of letting the be "the wild west" is extremely beneficial to both device management teams and information security. ---------------------------------------------- Youtube Video Link: https://youtu.be/KTmpdEF8NT4 ---------------------------------------------- Documentation: Leverage enterprise ide...

How to get into cybersecurity and the skills you need

March 29, 2021 04:00 - 52 minutes - 51.9 MB

This week, Adam and Andy cover how people can break into the cybersecurity industry and the skills they might need prior to finding their first job. They cover a range of topics from basic technical knowledge to tools to soft skills to certifications and more. If you're looking at getting into the industry, this episode is for you! ---------------------------------------------- Youtube Video Link: https://youtu.be/kMN05pe0WnU ---------------------------------------------- Documentation:...

Azure Sentinel with Special Guest John Joyner

March 21, 2021 20:55 - 42 minutes - 42.9 MB

This week, Microsoft MVP John Joyner joins the show to talk about Azure Sentinel. If you're in the market for a SIEM or looking to bolster your security tools at your organization, we give you some ideas to think about when it comes to Azure Sentinel and how it can be a very cost-effective way to gain oversight on your company's security posture. ---------------------------------------------- Youtube Video Link: https://youtu.be/FBBYH__6DFo ---------------------------------------------- ...

Physical Security with Special Guest Wesley Strey

March 15, 2021 02:08 - 34 minutes - 25.1 MB

This week, Andy is joined by Wesley Strey to talk about the subdomain of physical security. There are so many great parallels between information security and physical security. We hope listeners walk away with a better understanding of how physical security can affect your information security program. ---------------------------------------------- Youtube Video Link: https://youtu.be/w1l29YHGj3o ---------------------------------------------- Wesley Strey LinkedIn: https://www.linkedin...

Say Goodbye to Domain Join with Special Guest Shannon Fritz

March 08, 2021 02:37 - 1 hour - 55.6 MB

This week, Shannon Fritz joins the show to talk about device identity and why you should start joining your devices to Azure Active Directory. This show is jam packed full of information from dispelling some of the myths of Azure AD joining to what steps to take to begin your Azure AD join journey. We hope you enjoy listening! ---------------------------------------------- Youtube Video Link: https://youtu.be/iO5a21WJhiA ---------------------------------------------- Documentation Windo...

Cloud Application Security Brokers

February 28, 2021 21:19 - 40 minutes - 39.5 MB

This week, Adam and Andy talk about cloud application security brokers (CASB). The podcast is focused more around Microsoft Cloud App Security but the concepts and use cases can be applied to any CASB solution. ---------------------------------------------- Youtube Video Link: https://youtu.be/j43MFpxMsqE ---------------------------------------------- Documentation MCAS Ninja Training: https://techcommunity.microsoft.com/t5/microsoft-security-and/the-microsoft-cloud-app-security-mcas-n...

Password Managers

February 22, 2021 05:00 - 40 minutes - 38.3 MB

This week, Adam and Andy talk about password managers. They discuss on password managers can protect you from phishing attacks, pros/cons of storing your TOTP key within your vault, and compare three different popular password managers on the market: Lastpass, 1Password, and BitWarden. ---------------------------------------------- Youtube Video Link: https://youtu.be/op9TGKlRZDY ---------------------------------------------- Documentation https://blog.1password.com/totp-and-1password/ ...

What is EvilGinx and How do you protect against it?

February 15, 2021 04:03 - 41 minutes - 41.4 MB

This week, Adam and Andy talk about a Red Team/Pentesting tool called EvilGinx. They explain how this tool works and how cyber-criminals can use it to bypass MFA enabled accounts. Most importantly, they provide several ways to mitigate against this using enterprise driven phishing education campaigns, security awareness training, and device-based conditional access. ---------------------------------------------- Youtube Video Link: https://youtu.be/a2NLk0GnUJ8 ---------------------------...

Modern Device Management

February 08, 2021 02:39 - 44 minutes - 44.7 MB

This week, Adam and Andy go over modern device management. They discuss how to use device based conditional access to make access decisions on corporate or personal devices spanning different operating systems in the modern "work from home" and post-COVID world. ---------------------------------------------- YouTube Video Link: https://youtu.be/s46ZhXnngjg ---------------------------------------------- Documentation: Windows Autopilot https://docs.microsoft.com/en-us/mem/autopilot/win...

Real-world Ransomware Experience with Special Guest Gavin Ashton

February 01, 2021 02:54 - 40 minutes - 37.9 MB

This week, Adam and Andy speak with Stealthbits security strategist, Gavin Aston. Gavin wrote the blog "Maersk, me & notPetya" and brings a unique percepective to information security defense as someone who's survived a ransomware attack. Youtube Video Link Documentation: Maersk, me & notPetya Protecting Microsoft 365 from on-premises attacks Contact: Gavin Aston Twitter: @gvnshtn Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: [email protected] Adam Brewer Twitter: ...

Application Security with Special Guest Tanya Janca

January 25, 2021 05:00 - 59 minutes - 42.3 MB

This week, Adam and Andy speak with application security guru, Tanya Janca, author of Alice and Bob learn Application Security. It was an amazing conversation where they touched on secure app design practices, password requirements, and infosec industry mentorship and education. Youtube Video Link Documentation: Alice and Bob learn Application Security We Hack Purple Academy We Hack Purple Youtube/Podcast Contact: Tanya Janca Twitter: @shehackspurple LinkedIn: tanya-janca Andy Jaw ...

Secure Messaging

January 18, 2021 04:59 - 37 minutes - 36.9 MB

This week, Adam and Andy go over some news about Microsoft Defender for Identity and Intel's new CPU ransomware protection. There was also some news about Whatsapp's new privacy policy. Adam and Andy dive into a comparison of the most popular secure messaging apps including an exploit that would affect all secure messengers. Documentation: Whatsapp's Updated Privacy Policy Signal Messenger Threem Messenger Secure Messaging Apps Comparison Contact: Twitter: @bluesecuritypod Instagram:...

Solarwinds Revisited and Tech Policy under a Biden Administration

January 11, 2021 05:00 - 35 minutes - 32.5 MB

This week, Adam and Andy revisit some more guidance that has come out about Sunburst/Solarigate since the initial breach. Additionally, they share some thoughts about this week's insurrection at the US Capitol and the cybersecurity implications. Finally, with a Biden administration and a Democratic controlled government, Andy and Adam speculate on what might be taken up as priority when it comes to tech policy. Documentation: Microsoft Solarigate Resource Center Using Splunk to Detect Sun...

Information Security Tips & Tricks for Parents

January 04, 2021 05:00 - 31 minutes - 36.3 MB

Happy New Year! To ring in the new year, this week's episode focuses on parents who are working from home while having to help home school their kids as well. Adam and Andy go through a lot of tips and tricks that will help secure home networks, devices, and cloud accounts. Documentation: Setup OpenDNS Quad9 Disney Circle Eero Wifi How to change your wireless router's admin password 3-router method (Stacking routers for security) Ubiquiti Unifi Apple's Data Access when personal safe...

Merry Christmas! Learn how to spin up your own VM lab and dev environments

December 27, 2020 04:18 - 33 minutes - 38.3 MB

This holiday week, Adam and Andy give you some advice on how to spin up your own virtual machine lab and dev environment. They go through SaaS applications that have free dev environments as well as tools to use to manage VM's. They also give tips on what you can do with that lab environment from testing policies to managing devices in Intune and even learning about tools like Mimikatz and John the Ripper. Documentation: Lab Building Guide: Virtual Active Directory Script to spin up AD co...

Our thoughts on Fireeye, Solarwinds, and Sunburst

December 21, 2020 04:40 - 34 minutes - 38.3 MB

This week, Adam and Andy give you their thoughts on the Fireeye and Solarwinds breach. They also give defenders advice on immediate steps to help strengthen their organizations as well as some future insights on the direction security may be heading in terms on identity and device management. Finally, they give some thoughts on why it is important for security, business, and technical teams need to work as one cohesive unit in order to make security programs successful. Documentation: Unau...

Passwordless Authentication

December 14, 2020 05:00 - 38 minutes - 43 MB

Passwordless authentication is one of those rare features that strengthens security while making it easier for users to sign in. This week, Adam and Andy breakdown passwordless authentication options for enterprises in Windows, Azure AD, and other third party IDP's. They also address concerns about privacy when it comes to biometric data. Documentation: Windows Hello for Business Plan a passwordless authentication deployment in Azure Active Directory Passwordless authentication options f...

Conditional Access

December 07, 2020 04:41 - 34 minutes - 38.8 MB

This is it! Adam and Andy are finally diving into conditional access. They give an overview on what conditional access is including different types of conditional access like user, sign-in, and device based. Stick around until the end where Adam gives a great overview on a new feature for Azure AD authentications called Continuous Access Evaluation that changes the duration authentication tokens and how they are evaluated. Documentation: Advancing Password Spray Attack Detection Continuou...

Work from Home - Tips and Tricks

November 30, 2020 05:00 - 26 minutes - 28.4 MB

On this week's episode, Andy and Adam give you their tips and tricks for working from home. Having been in mature work from home company cultures, they have insights on what it was like pre and post pandemic. Enjoy! Documentation: Rework by Jason Fried and David Heinemeier Hansson Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/

Our thoughts on Chris Krebs, Infosec Job Security, and Infosec Qualifications

November 23, 2020 05:00 - 24 minutes - 26.7 MB

On this week's episode, Andy and Adam give their thoughts on the firing of Chris Krebs, former director of CISA. They also talk about their opinions on whether a CISO should be fired after a cybersecurity breach. Finally, they discuss if people need to have technical degrees and what qualifications are required to be in infosec. Documentation: CISA's Statement on the Nov 3rd Election IT Director fired after ransomware attack Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.co...

Guest speaker Morgan Patzwald on Active Directory Security

November 16, 2020 05:00 - 36 minutes - 41.3 MB

This week, Morgan joins Adam and Andy on the podcast to discuss on-prem Active Directory security. They dive into administrator privileges, best practice for account creation, GPO's, and server admins. They also discuss the concept of Privileged Access Workstations (PAW). Documentation: Securing Privileged Access Privileged Access Workstations Morgan Patzwald Twitter: @morgancpatz Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbre...

Active Directory Security with Special Guest Morgan Patzwald

November 16, 2020 05:00 - 36 minutes - 41.3 MB

This week, Morgan joins Adam and Andy on the podcast to discuss on-prem Active Directory security. They dive into administrator privileges, best practice for account creation, GPO's, and server admins. They also discuss the concept of Privileged Access Workstations (PAW). Documentation: Securing Privileged Access Privileged Access Workstations Morgan Patzwald Twitter: @morgancpatz Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbre...

Single-Sign On (SSO) and Self-Service Password Reset (SSPR)

November 09, 2020 05:00 - 31 minutes - 35.6 MB

This week, Adam and Andy go over why you should think about using an Identity Provider (IDP) to onboard your SaaS apps to use SSO. They also talk about why it's really important to think about what IDP to go with prior to making a decision. Finally, they talk about SSPR and why it's important to implement this feature in your organization. Documentation: Azure AD SSO options Enable Azure SSPR Enable Okta SSPR Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ ...

How did we get into information security and career progression advice

November 02, 2020 03:54 - 43 minutes - 48.4 MB

This week, Adam and Andy bring you a bonus episode where they talk about how they got into information security and offer advice on career progression in IT and cybersecurity. Documentation: Free Microsoft Developer's Environment Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/

Ransomware protection - Part 4 - Windows 10 Security, Network Segmentation, Detection and Recovery

October 26, 2020 03:24 - 29 minutes - 32.9 MB

This week, Adam and Andy wrap up the ransomware series by first going over controlled folder access in Windows 10 security and Onedrive for Business Known Folder Move. They discuss network segmentation and go into tools and process for detection and incident response. Finally, they conclude with tips on business continuity and disaster recovery when it comes to ransomware and cybersecurity. Documentation: Controlled Folder Access Onedrive for Business Known Folder Move Azure ATP/Microsof...

Ransomware Protection - Part 3 - Admin Rights, Email Protection, Phishing Training

October 19, 2020 04:00 - 33 minutes - 36.6 MB

This week, Adam and Andy continue the conversation on techniques and tools to protect your organization from ransomware. They dive into the concept of least privileged access and administrative rights, email protection solutions, and phishing/cybersecurity training program concepts for your company. Documentation: Exchange Online Protection Overview https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/exchange-online-protection-overview?view=o365-worldwide Office 3...

Ransomware Protection - Part 2 - EDR, Patching, and Pentesting

October 12, 2020 04:00 - 32 minutes - 35.7 MB

This week, Adam and Andy continue the conversation on techniques and tools to protect your organization from ransomware. They dive into EDR solutions, patching and vulnerability assessment management, and pentesting. Documentation: Maersk, me & notPetya: https://gvnshtn.com/maersk-me-notpetya/ The Untold Story of NotPetya, the Most Devastating Cyberattack in History: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ Andy Jaw Twitter: @ajawzero Li...

Ransomware Protection - Part 1 - Soft Skills and Endpoint Protection

October 05, 2020 05:14 - 33 minutes - 36.7 MB

Due to the recent ransomware attacks, Adam and Andy use this episode to kick off a series on how to protect your company from ransomware. We started with how security professionals need to have soft skills in order to be successful at any organization. We followed up with a deep dive on why we believe Microsoft Defender for Endpoint is the most cost effective solution you can deploy. Documentation: Microsoft Defender in a Sandbox: https://www.microsoft.com/security/blog/2018/10/26/windows...

Twitter Mentions

@ajawzero 203 Episodes
@ajbrewer 203 Episodes
@bluesecuritypod 185 Episodes
@mauvlan 2 Episodes
@swiftonsecurity 2 Episodes
@racheltobac 2 Episodes
@snorkel42 2 Episodes
@mrshannonfritz 2 Episodes
@divinetechygirl 2 Episodes
@frankmcg 2 Episodes
@shehackspurple 2 Episodes
@gvnshtn 2 Episodes
@morgancpatz 2 Episodes
@cherthedev 1 Episode
@infosec_fox 1 Episode
@leakissner 1 Episode
@decryptlyfe 1 Episode
@techspence 1 Episode
@crisisofconsc 1 Episode
@charityw4cti 1 Episode