Videos

HDInsight Compliance

HDInsight Compliance

2 weeks ago
asdf

Not-so-Cloudy Controls

2 weeks ago
A summary of AWS controls around security groups and the thinking behind redundant controls for state and activity.

Hyped Attacks

2 weeks ago
Sussing out the recent attack widely trumpeted by the media as Russians hacking the US power grid. Spoiler alert: it wasn’t.
Enterprise Threat Detection Service: An In-Depth Overview of Microsoft’s Latest Cybersecurity Solution

Enterprise Threat Detection Service: An In-Depth Overview of Microsoft’s Latest Cybersecurity Solution

3 weeks ago
Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system.  Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity […]
Security Questions

Security Questions

4 weeks ago
Building a password reset function? Skip the security questions. Implement 2FA with phones. Here’s why
Challenging Assumptions

Challenging Assumptions

4 weeks ago
The assumption that we’re vulnerable is just as dangerous as the assumption that no one wants to hack us.
Rogue One and InfoSec, Part 2

Rogue One and InfoSec, Part 2

4 weeks ago
Episode 2: Defending the Empire. If Star Wars: A New Hope is a parable of incident management, as Kellman Meghu demonstrated, then Star Wars: Rogue One is a lesson in a security breach. But, hey, it was a "business decision."
Rogue One and InfoSec, Part 1

Rogue One and InfoSec, Part 1

4 weeks ago
If Star Wars: A New Hope is a parable of incident management, as Kellman Meghu demonstrated, then Star Wars: Rogue One is a lesson in a security breach. Here’s what the Empire missed.
What could possibly go wrong?

What could possibly go wrong?

4 weeks ago
A finding is just a finding. But a finding that enables a realistic threat? Now there’s something to care about.
Windows Server 2016: (Part 1) Getting Started with Shielded VMs

Windows Server 2016: (Part 1) Getting Started with Shielded VMs

1 month ago
One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the  new features and functions found in “Shielded VMs” for Windows Server 2016. [1:19] What is a […]
Empower Retirement Accelerates Growth with Exadata

Empower Retirement Accelerates Growth with Exadata

1 month ago
With the superior performance and scalability of Oracle Exadata, Empower Retirement grows rapidly, enhances customer service, and simplifies IT infrastructure.
SQL Injection and WaitFor

SQL Injection and WaitFor

1 month ago
An example in threat modeling and creating controls for a specific tactic attackers use to break into Websites.