Info

Brakeing Down Security Podcast

A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
RSS Feed Subscribe in Apple Podcasts
Brakeing Down Security Podcast
2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


All Episodes
Archives
Now displaying: March, 2014
Mar 31, 2014

We are pleased to be the only podcast to have audio of the talk Phil Beyer gave at Bsides Austin!  It is a very informative talk about leadership, not just in Information Security, but how to be a leader in any field you do.

 

Breaking Down Security will also carry a 2 part interview with Phil. The first will post on the 6th of April, and the 2nd part will be on the 13th of April.

Phil uploaded the slides of this presentation at Bsides Austin at http://www.slideshare.net/pjbeyer/choose-to-lead.

Brakeing Down Security would like to thank Phil Beyer for his time and generosity.

Mar 31, 2014

We discuss IDS and IPS, why they are needed, and why they get a pass on how easily they are bypassed, and why AV gets all the press...

 

 

 

 

 

Intro "Private Eye", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) 
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/

 

 

 

Mar 24, 2014

This week, we got into some discussion about frameworks, and the different types of frameworks available (regulatory, "best practice", and process improvement)

We also looked at the new "Framework for Improving Critical Infrastructure Cybersecurity" ratified and released last month.

Does it meet with our high expectations? You'll just have to listen and find out.

 

http://www.nist.gov/cyberframework/

 

 

 

Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) 
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/

Mar 18, 2014

Cracking great show this week!  Mr. Boettcher and I got all into authentications methods, why they don't always work, and what can we do to make passwords more secure, using Mike Murray's method of 'Passphrases' over passwords...

 

Finally, we talked about some adventure Mr. boettcher had with a friend's malware infection (it wasn't me, I promise!).  He took what we learned from @hackerhurricane (Michael Gough) and is actively doing forensics on it.

 

 

http://daleswanson.org/things/password.htm

Malware, Rootkits & Botnets A Beginner's Guide by Christopher Elisan

 

 

 

 

 

 

 

Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) 
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/

Mar 9, 2014

This is the Part 2 of our Interview with Kevin Johnson.  During our interview, we followed him down the rabbit hole.  We learned how to default rulesets in ANY rules based hardware solution sucks.  We learned that being a security professional is more than just a fancy title.  And finally, we learned that Kevin is a huge fan of Star Wars.

 

DB Visualizer --  http://www.dbvis.com/

 

Good article on how homomorphic encryption works:

http://www.americanscientist.org/issues/pub/2012/5/alice-and-bob-in-cipherspace

 

 

Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) 
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/

Mar 4, 2014

During our SEC542, GIAC Web App Pentesting course, we got the pleasure and honor of sitting down with Kevin Johnson from SecureIdeas on who he is, how Samurai WTF came into being, and why we should be doing licensing for proper ethcial hackers.

 

Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) 
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/

1