Logo

    aprilwright

    Explore "aprilwright" with insightful episodes like "April Wright: Going Attractions... The Movie Palace (10/20/2020)", "What Does It Mean To Be A Hacker? - PSW #635", "What Does It Mean To Be A Hacker? - PSW #635", "Twerking Santa - PSW #631" and "Twerking Santa - PSW #631" from podcasts like ""Richard Skipper Celebrates", "Paul's Security Weekly (Video-Only)", "Security Weekly Podcast Network (Video)", "Security Weekly Podcast Network (Audio)" and "Paul's Security Weekly (Podcast-Only)"" and more!

    Episodes (17)

    April Wright: Going Attractions... The Movie Palace (10/20/2020)

    April Wright: Going Attractions... The Movie Palace (10/20/2020)
    "Going Attractions: The Definitive Story of the Movie Palace,” from writer-director April Wright, is a loving documentary celebrating cinema and movie houses. Movie palaces were ornate, opulent theaters that showed films from circa 1910 through WWII. April Wright is an award winning filmmaker who brings a fresh and creative approach to her documentaries and narrative projects.  She’s drawn to material based on real events, especially stories with an unexpected hero or point of view.  Working as a narrative programmer for the Sundance Film Festival for the past 15 years, Sundance has been her film school. April’s latest documentary “Going Attractions: The Definitive Story of the Movie Palace” has enjoyed a theatrical release, won numerous Best Documentary awards at film festivals, was named by critics as one of the top documentaries of 2019. Forbes called it “a richly crafted look at our passion for movie theaters.” April's documentary “Stuntwomen: The Untold Hollywood Story” with Executive Producer Michelle Rodriguez also releases in 2020. Special guest Rosie Novellino-Mearns is the author of SAVING RADIO CITY MUSIC HALL: A Dancer's True Story.  https://www.goingattractions.com/ https://vimeo.com/201732456 https://youtu.be/z4qFybEDUMo https://www.amazon.com/Saving-Radio-City-Music-Hall/dp/0990855635/ https://www.facebook.com/rosie.novellinomearns

    What Does It Mean To Be A Hacker? - PSW #635

    What Does It Mean To Be A Hacker? - PSW #635

    This is the Hacker Culture Roundtable discussion from the Security Weekly Christmas podcast marathon and features almost all of our hosts and special guests. Hacking is a term used to describe the activity of modifying a product or procedure to alter its normal function, or to fix a problem. The term purportedly originated in the 1960s, when it was used to describe the activities of certain MIT model train enthusiasts who modified the operation of their model trains. They discovered ways to change certain functions without re-engineering the entire device. These curious individuals went on to work with early computer systems where they applied their curiosity and resourcefulness to learning and changing the computer code that was used in early programs. To the general public, a "hack" became known as a clever way to fix a problem with a product, or an easy way to improve its function. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode635

    What Does It Mean To Be A Hacker? - PSW #635

    What Does It Mean To Be A Hacker? - PSW #635

    This is the Hacker Culture Roundtable discussion from the Security Weekly Christmas podcast marathon and features almost all of our hosts and special guests. Hacking is a term used to describe the activity of modifying a product or procedure to alter its normal function, or to fix a problem. The term purportedly originated in the 1960s, when it was used to describe the activities of certain MIT model train enthusiasts who modified the operation of their model trains. They discovered ways to change certain functions without re-engineering the entire device. These curious individuals went on to work with early computer systems where they applied their curiosity and resourcefulness to learning and changing the computer code that was used in early programs. To the general public, a "hack" became known as a clever way to fix a problem with a product, or an easy way to improve its function. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode635

    Twerking Santa - PSW #631

    Twerking Santa - PSW #631

    This week, we kick things off with the Blue Team Roundtable, to discuss defensive techniques that actually work, and ones that don't! In the second segment, we'll switch teams and transition to The State of Penetration Testing Roundtable, where we'll discuss the evolution of Penetration Testing, and how to get the most value from the different types of assessments! In our final segment, we welcome back long-time friend of the show Ed Skoudis, to discuss this year's Counterhack Holiday Hack Challenge, a holiday tradition here at Security Weekly, and one of the community's favorite hacking challenges!

     

    Show Notes: https://wiki.securityweekly.com/PSWEpisode631

    Visit https://www.securityweekly.com/psw for all the latest episodes!

     

    Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    Twerking Santa - PSW #631

    Twerking Santa - PSW #631

    This week, we kick things off with the Blue Team Roundtable, to discuss defensive techniques that actually work, and ones that don't! In the second segment, we'll switch teams and transition to The State of Penetration Testing Roundtable, where we'll discuss the evolution of Penetration Testing, and how to get the most value from the different types of assessments! In our final segment, we welcome back long-time friend of the show Ed Skoudis, to discuss this year's Counterhack Holiday Hack Challenge, a holiday tradition here at Security Weekly, and one of the community's favorite hacking challenges!

     

    Show Notes: https://wiki.securityweekly.com/PSWEpisode631

    Visit https://www.securityweekly.com/psw for all the latest episodes!

     

    Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    Security vs. Compliance - PSW #632

    Security vs. Compliance - PSW #632

    It was once said that if Security and Compliance were in a relationship the status would be "It's Complicated". This discussion will aim to help you understand this relationship and how it can be beneficial or a mere distraction to an organization's overall security posture. - Define "Secure" and "Compliant". - Does compliance merely raise awareness about security shortcomings? - What is the relationship between Security and Compliance? - Being Secure and being Compliant are mere points in time, how can we best develop a process to ensure we are always striving to a secure and compliant state? - How does Security impact and/or influence Compliance? - How does Compliance impact and/or influence Security? - How do you balance these extremes: "We will be Secure and ignore compliance" vs. "We will be compliant but ignore security"

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/PSWEpisode632

    Security vs. Compliance - PSW #632

    Security vs. Compliance - PSW #632

    It was once said that if Security and Compliance were in a relationship the status would be "It's Complicated". This discussion will aim to help you understand this relationship and how it can be beneficial or a mere distraction to an organization's overall security posture. - Define "Secure" and "Compliant". - Does compliance merely raise awareness about security shortcomings? - What is the relationship between Security and Compliance? - Being Secure and being Compliant are mere points in time, how can we best develop a process to ensure we are always striving to a secure and compliant state? - How does Security impact and/or influence Compliance? - How does Compliance impact and/or influence Security? - How do you balance these extremes: "We will be Secure and ignore compliance" vs. "We will be compliant but ignore security"

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/PSWEpisode632

    DevOps and Securing Applications - PSW #632

    DevOps and Securing Applications - PSW #632

    - Given that DevOps is a process and its execution requires many different tools, how do we get started "doing DevOps"? - What about DevOps allows us to produce more secure applications? - What concepts inside of DevOps do most people lose site of? - What are the major challenges involved in taking an application from traditional development to DevOps? - What are some of the best approaches to making an application more resilient to threats - To ORM or not to ORM? - Which services do you implement yourself vs. using a cloud service? - How do I choose the best secrets vault? - What should I use an orchestrator for and what should I not use an orchestrator for? - How do I build a secure API for my app? - Thoughts on GraphQL vs. REST security implications? Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode632

    DevOps and Securing Applications - PSW #632

    DevOps and Securing Applications - PSW #632

    - Given that DevOps is a process and its execution requires many different tools, how do we get started "doing DevOps"? - What about DevOps allows us to produce more secure applications? - What concepts inside of DevOps do most people lose site of? - What are the major challenges involved in taking an application from traditional development to DevOps? - What are some of the best approaches to making an application more resilient to threats - To ORM or not to ORM? - Which services do you implement yourself vs. using a cloud service? - How do I choose the best secrets vault? - What should I use an orchestrator for and what should I not use an orchestrator for? - How do I build a secure API for my app? - Thoughts on GraphQL vs. REST security implications? Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode632

    Blue Team Tactics and Techniques - PSW #631

    Blue Team Tactics and Techniques - PSW #631

    It's often said that attackers need only to get it right once, where defenders have to be right all of the time. Those of us who have worked in a security role as a defender know we don't always get it right, in fact, there are often many exposures in our defenses. This segment will aim to help defenders learn tactics and techniques that are effective and try to answer some of the following questions: - How do you prioritize your defensive efforts? - How do you best detect attacks? - How do you best protect against attacks? - We always say "patch your stuff" but how often should you patch? Which systems should you patch? - What techniques work best to defend against email phishing? - How do you provide a "good enough" level of security for your Active Directory? - What are the fundamentals of defense? How do they differ per environment and organization? - How do you get management to buy-in to your security plans and spending?

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/PSWEpisode631

    Blue Team Tactics and Techniques - PSW #631

    Blue Team Tactics and Techniques - PSW #631

    It's often said that attackers need only to get it right once, where defenders have to be right all of the time. Those of us who have worked in a security role as a defender know we don't always get it right, in fact, there are often many exposures in our defenses. This segment will aim to help defenders learn tactics and techniques that are effective and try to answer some of the following questions: - How do you prioritize your defensive efforts? - How do you best detect attacks? - How do you best protect against attacks? - We always say "patch your stuff" but how often should you patch? Which systems should you patch? - What techniques work best to defend against email phishing? - How do you provide a "good enough" level of security for your Active Directory? - What are the fundamentals of defense? How do they differ per environment and organization? - How do you get management to buy-in to your security plans and spending?

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/PSWEpisode631

    Know Where You're Putting Your Tool - Paul's Security Weekly #587

    Know Where You're Putting Your Tool - Paul's Security Weekly #587

    This week, we welcome Vaughn Adams, Enterprise Sales Engineer at LogRhythm! Vaughn will be talking about using freely available tools and logs you are already collecting to detect attacker behavior! In our second segment, we have a Round Table discussion entitled "What the Heck Are Security Basics?", to talk about what should organizations be doing to meet the basic security requirements, and much more! In our final segment, we air a pre-recorded interview with Mandy Logan on "Hacking the Brainstem", her trip through recovery, and how she came to love Information Security!

     

    Full Show Notes: https://wiki.securityweekly.com/Episode587

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    To get involved with LogRhythm, go to: www.securityweekly.com/logrhythm

    Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke

     

    Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    Know Where You're Putting Your Tool - Paul's Security Weekly #587

    Know Where You're Putting Your Tool - Paul's Security Weekly #587

    This week, we welcome Vaughn Adams, Enterprise Sales Engineer at LogRhythm! Vaughn will be talking about using freely available tools and logs you are already collecting to detect attacker behavior! In our second segment, we have a Round Table discussion entitled "What the Heck Are Security Basics?", to talk about what should organizations be doing to meet the basic security requirements, and much more! In our final segment, we air a pre-recorded interview with Mandy Logan on "Hacking the Brainstem", her trip through recovery, and how she came to love Information Security!

     

    Full Show Notes: https://wiki.securityweekly.com/Episode587

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    To get involved with LogRhythm, go to: www.securityweekly.com/logrhythm

    Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke

     

    Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    PCI Piñata - Paul's Security Weekly #583

    PCI Piñata - Paul's Security Weekly #583

    This week, we welcome Jon Buhagiar, Network+ Review Course Instructor at Sybex for an interview to talk about Network Operations! In the Technical Segment, we welcome back John Moran, Senior Product Manager at DFLabs to talk about IncMan SOAR and how DFLabs Automation & Response platform helps automate, orchestrate, and measure CSIRTs and SOCs! In the Security News this week, 7 new Spectre/Meltdown attacks, Hacking ATM's for free cash is easier than Windows XP, AI can now fake fingerprints fooling ID scanners, and Japan's cybersecurity minister admits he's never used a computer!

     

    Full Show Notes: https://wiki.securityweekly.com/Episode583

    To learn more about DFLabs, go to: www.dflabs.com/securityweekly

     

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!

     

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    PCI Piñata - Paul's Security Weekly #583

    PCI Piñata - Paul's Security Weekly #583

    This week, we welcome Jon Buhagiar, Network+ Review Course Instructor at Sybex for an interview to talk about Network Operations! In the Technical Segment, we welcome back John Moran, Senior Product Manager at DFLabs to talk about IncMan SOAR and how DFLabs Automation & Response platform helps automate, orchestrate, and measure CSIRTs and SOCs! In the Security News this week, 7 new Spectre/Meltdown attacks, Hacking ATM's for free cash is easier than Windows XP, AI can now fake fingerprints fooling ID scanners, and Japan's cybersecurity minister admits he's never used a computer!

     

    Full Show Notes: https://wiki.securityweekly.com/Episode583

    To learn more about DFLabs, go to: www.dflabs.com/securityweekly

     

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!

     

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    April Wright, ArchitectSecurity.org - Application Security Weekly #32

    April Wright, ArchitectSecurity.org - Application Security Weekly #32

    Keith Hoodlet and Paul Asadoorian interview April Wright. They discuss people connected by apps, workplace reward systems, and the importance of building/practicing the process before documenting it. Full Show Notes: https://wiki.securityweekly.com/ASW_Episode32 Follow us on Twitter: https://www.twitter.com/securityweekly