Logo

    watchguard

    Explore " watchguard" with insightful episodes like "482 Storytime: XChange 2023, Swag and IT Etiquette", "Record Breaking DDoS, Cracked Crypto, and ICS Honeypots", "Java 0day, UPnP Pwnage, and Red October", "WatchGuard's 2013 Security Predictions Unveiled" and "2012 Prediction Review: Win or Fail?" from podcasts like ""Uncle Marv's IT Business Podcast", "Radio Free Security", "Radio Free Security", "Radio Free Security" and "Radio Free Security"" and more!

    Episodes (25)

    482 Storytime: XChange 2023, Swag and IT Etiquette

    482 Storytime: XChange 2023, Swag and IT Etiquette

    The XChange Conference organized by the Channel Company is an annual event that brings together technology industry leaders, vendors, and solution providers to network, share ideas, and discuss emerging trends and challenges. The conference features keynote speakers, panel discussions, and breakout sessions that cover a range of topics, including cloud computing, cybersecurity, digital transformation, and more. Attendees can explore new products and services, engage with experts, and learn best practices for staying ahead of the curve in a rapidly evolving industry. The XChange Conference is a must-attend event for anyone looking to expand their knowledge and network in the technology sector.

    Swag Winner: SonicWall

    1st Runner-Up: WatchGuard

    Honorable Mentions: Wasabi, Pax8 and OpenText

    === 

    Synco Ask Me Anything: https://syncromsp.com/webinars/ask-us-anything/

    XChange Events Website: https://www.thechannelco.com/events

    ASCII Edge, The MSP Conference 2023: https://events.ascii.com/

    Microsoft 365 Apps Exploited through CVSS 9.8 Bug... Patch Now! https://tinyurl.com/ytbwfmw3

    Florida Man from Different Earth Naked in Palm Beach: https://tinyurl.com/ynx2fpv3

    Florida Man Series Coming to Netflix: https://tinyurl.com/5duaadv6

     

    === Show Information

    Website: https://www.itbusinesspodcast.com/

    Host: Marvin Bee

    Uncle Marv’s Amazon Store: https://amzn.to/3EiyKoZ

    Become a monthly supporter: https://www.patreon.com/join/itbusinesspodcast?

    One-Time Donation: https://www.buymeacoffee.com/unclemarv

    === Music: 

    Song: Upbeat & Fun Sports Rock Logo

    Author: AlexanderRufire

    License Code: 7X9F52DNML - Date: January 1st, 2024

    Record Breaking DDoS, Cracked Crypto, and ICS Honeypots

    Record Breaking DDoS, Cracked Crypto, and ICS Honeypots
    In our March episode, the LiveSecurity analyst team discusses two months worth of InfoSec news during our Security Story of the Month segment. We cover new weaknesses in a cipher associated with SSL and TLS, more zero day Java exploits, a severe sentence in a cyber security trial, the largest DDoS attack ever seen, and more. We also debut a funny, security-themed Thrift Shop parody song made by WatchGuard employees. So get comfy, adjust your volume, and enjoy the show.

    Java 0day, UPnP Pwnage, and Red October

    Java 0day, UPnP Pwnage, and Red October
    During this month's Security Story of the Month segment the LiveSecurity analyst team discusses the biggest InfoSec stories from January. Topics include wide-spread Java zero days, a nasty new advanced malware campaign called Red October, some industry-wide Universal Plug and Play vulnerabilities, and much more. Also stay tuned for What's Up With WatchGuard, where WatchGuard's XTM appliance product manager unveils some exciting new security hardware. Settle down, adjust your volume, and enjoy the show.

    WatchGuard's 2013 Security Predictions Unveiled

    WatchGuard's 2013 Security Predictions Unveiled
    Last episode, we reviewed our 2012 security prediction results. This time we unveil WatchGuard's 2013 security predictions. They cover topics like life-threatening hardware hacks, mobile device pick-pockets, cyber strike-back, zombie browsers, and much more. Whether or not these predictions come true, the episode explores many real infosec trends that everyone, from the smallest consumer to the largest enterprise CSO, will face in 2013. Join us for a glimpse into the future of cyber security.

    2012 Prediction Review: Win or Fail?

    2012 Prediction Review: Win or Fail?
    We're nearing the end of the year, which means it's prediction time. In the first of two special episodes, the Radio Free Security team looks back at our 2012 security forecasts. Did our predictions for the year ring true, or were they epic fails? Join Corey Nachreiner and the co-hosts from the Security Story of the Month to find out. The discussion covers a bevy of topics, including mobile malware, APTs, BYOD, virtualization, location awareness, infrastructure attacks, and much more. Whether you're curious how our predictions did, or you just want to review the most relevant security issues from 2012, this episode is for you... And don't forget to join us next time, when we reveal our 2013 predictions.

    The Dirty Little Secret of Security Breaches

    The Dirty Little Secret of Security Breaches
    In October's Security Spotlight, Ben Brobak and Corey Nachreiner unveil the secret culprit for most security breaches. More importantly, they discuss firewall policy best practices that will help you avoid such breaches. Also, learn about WatchGuard's new RapidDeploy capability in an interview with Product Manager, Johnni Aguirre. Finally, we discuss cyber espionage accusations, new nation-state sponsored malware, and some major DDoS attacks in this episode's Security Story of the Month segment. We cover a lot in this episode, so sit down, relax, and enjoy the show.

    Cyber Attacks on Physical Infrastructure: Protecting SCADA and ICS Systems

    Cyber Attacks on Physical Infrastructure: Protecting SCADA and ICS Systems
    Digital network attacks that can blow up generators, shut down power grids, or damage nuclear facilities seem like the stuff of science fiction. However, we currently live in a world where nation-states launch just such attacks against one another, and may escalate them in the future. In this episode, Nachreiner interviews an industry expert from Alstom Grid about SCADA and ICS systems, and the ramifications of digital attacks against physical infrastructure. Nachreiner also joins two other WatchGuard security experts to identify the Security Story of the Month. They talk about stolen digital certificates, Internet Explorer zero day, and a big network breach, to decide which story has the greatest ramifications for the industry. Join us for another exciting episode of Radio Free Security.

    Nation-state Malware, VMware Worms, and Java Zero Days

    Nation-state Malware, VMware Worms, and Java Zero Days
    August's abbreviated episode includes an exciting Security Story of the Month segment and a trip down memory lane, with the Tip-o-matic 650. In this month's security news recap, Richard Gilmour, Christian Garland, and Corey Nachreiner highlight the most concerning security stories and incidents from August. The segment includes a new advanced persistent threat, some paradigm shifting malware, and a highly critical Java zero day vulnerability that attackers are exploiting in the wild. Be sure to listen for the latest defenses. We also dust off an old Tip-o-matic 650 clip. Listen to past Radio Free Security hosts share a few security best practices that are still relevant today. So grab a seat, get comfortable and click play.

    Blackhat & Defcon 2012: The Highlights

    Blackhat & Defcon 2012: The Highlights
    In July's Security Spotlight, guest host Ben Brobak interviews Corey Nachreiner about the most interesting briefings he attended at this year's Black hat security conference. They discuss the implications of some of these new threats and share security tips along the way. This episode's "Security Story of the Month" also shares a Blackhat and Defcon theme, with many of the biggest stories coming from these two popular security conferences. A roundtable of WatchGuard experts discuss NFC attacks, router rooting, and a serious problem with MS-CHAPv2 authentication. Tune in to learn all about Blackhat, Defcon, and the most important security news from July.

    Dissecting Flame: A Nation-State Cyber Espionage Threat

    Dissecting Flame: A Nation-State Cyber Espionage Threat
    Ben and Corey discuss the Flame worm in this month's Security Spotlight. What does this malware do, how does it spread, and how can you protect yourself from this type of advanced attack. They also discuss the evidence suggesting that Flame is a government sponsered cyber attack, and what that means for the future of network and information security. Also stay tuned for the "Security Story of the Month," where the LiveSecurity team chat about the Linkedin breach, Apple's new security stance, and intellectual property swiping malware. For your latest dose of security news and education, listen to this month's episode.

    Getting Started with Application Control

    Getting Started with Application Control
    In this month's Security Spotlight, Corey and Peter discuss Application Control; What is it? What can you do with it? And how do you get started? Learn how this powerful new security tool can increase your network visibility and control tenfold. Next, learn about the latest industry news during the "Security Story of the Month." Richard, Chris, and Corey discuss upcoming cyber legislation, paid security patches, and Android drive-by downloads. There's lots to learn, so be sure to listen in.

    Securing Your Servers in The Matrix

    Securing Your Servers in The Matrix
    In this month's Security Spotlight, Corey chats with WatchGuard's Director of Product Management about the history of virtualization and its security ramifications. He also learns about WatchGuard's upcoming virtual security solutions. Next, listen in on the "Security Story of the Month," where Christian, Chris, and Corey talk about cyber legislation, big breaches, and a nasty Mac botnet. So sit down, relax, and enjoy the show.

    Securing Mobile Devices in a BYOD World

    Securing Mobile Devices in a BYOD World
    In this episode, we return to our regular format. During the first segment, Corey interviews guest expert, Dean Colpitts, to discuss practical ways IT administrators can manage and secure Mobile devices. Next up? The return of "The Security Story of the Month". Tim, Richard, and Corey explore three big security stories from the month, and decide which is the most important. Grab a hot beverage, get comfy, and check out this month's show.

    Latest Phishing Trends

    Latest Phishing Trends
    Dave Piscitello, Senior Security Technologist for ICANN and a member of the Anti-Phishing Workgroup (APWG), describes how scam artists utilize second-level domain names to make it harder for authorities to take down scam web sites. Mark Waldstein and Scott Pinzon, CISSP, discuss security trends, including a TCP/IP stack vulnerability rumored to potentially take down the Internet. And a new segment called "Geek to Geek" spotlights a barbershop quartet that sings about Star Trek. Hosted by Scott Pinzon, CISSP.

    Son of the Tip-O-Matic

    Son of the Tip-O-Matic
    In his Security Story of the Month, Corey Nachreiner, CISSP, describes the compromise of Best Western Hotels in Germany, and why it is not "the greatest cyberheist in history," as the Glasgow Sunday Herald claimed. Mark Waldstein joins the show and discovers the Tip-O-Matic, which dispenses tips on EULAs, backups, and security by obscurity. The world of network security moves so fast that major events happened after we recorded our first two segments at the end of August, so Scott Pinzon finishes with updates from Sept. 8. Hosted by Scott Pinzon, CISSP.

    The Disgruntled Episode

    The Disgruntled Episode
    Two disgruntled men figured prominently in the news last month. Corey Nachreiner, CISSP, considers what lessons we can learn from engineer Terry Childs, who locked the City of San Francisco out of its own multi-million-dollar fiberWAN network. The CyberCrime Diaries segment answers the question, "Why don't the authorities stop cybercriminals?" by relating the five-year quest to convict spam king Robert Soloway. Hosted by Scott Pinzon, CISSP.

    Firebox Special: DNS Cache Poisoning

    Firebox Special: DNS Cache Poisoning
    In this month's episode, Radio Free Security's Scott Pinzon and Corey Nachreiner, both CISSPs, analyze the recent news of a potential "DNS cache poisoning" scare. They explain what it is, and how Firebox admins can counteract it. Then, Tech Support Team Lead Ben Brobak discusses the finer points of getting VPN tunnels going, and keeping them alive. Plus, "Crazy Mark" Romano returns with a sales promotion special deal.

    How They "Boldly Go" Break In

    How They "Boldly Go" Break In
    In his Security Story of the Month, Corey Nachreiner, CISSP, briefly touches on several topics, including hackers taking over a server related to Citibank; poor disclosure at online catalog company Wards; and an embarrassing hijacking of web sites belonging to IANA and ICANN. In Part 2, Corey explains why everyone should worry about two new Apple OS X Trojans. Jack Wiles, a pioneering physical penetration test team leader, reveals how he successfully broke into company after company, always undetected. Hosted by Scott Pinzon, CISSP.

    Firebox Special: Go Lean, Go Green

    Firebox Special: Go Lean, Go Green
    In this month's episode, Ian Kilpatrick of England's Wick Hill Group discusses how Europe is setting the pace for technology that is environmentally responsible - and how WatchGuard's UTM products lead the way. Also, Sandra Takeuchi introduces the new task-based Current Help pages on our web site, and technical trainer Matt Sando explains the differences between WatchGuard's two major SSL VPN solutions.
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io