Player FM - Internet Radio Done Right
214 subscribers
Checked 1+ y ago
تمت الإضافة منذ قبل seven عام
المحتوى المقدم من Support and SECTION 9. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Support and SECTION 9 أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية
S
Species Unite


1 Dr. Shirley Strum: The Echoes of Our Origins 39:06
39:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب39:06
"So I think this whole idea of cumulative culture is a way to make humans exceptional. But it's clear to me that humans are exceptional, and seeing it through baboon glasses, I can understand in a different way why they're exceptional. But many of the things that we think are uniquely human are actually present in other animals." - Dr. Shirley Strum Dr. Shirley Strum is a groundbreaking anthropologist who has spent over five decades living alongside wild baboons in Kenya. Her work has transformed our understanding of these intelligent, socially complex animals — their relationships, their adaptability, and the intricate societies they create. In her new book, Echoes of Our Origins , Shirley challenges long-held beliefs about evolution, the human-animal divide, and what it truly means to coexist. This conversation is about science — but it’s also about humility, hope, and the messy, beautiful complexity of life on Earth. Links: https://www.press.jhu.edu/books/title/53757/echoes-our-origins https://anthropology.ucsd.edu/people/faculty/faculty-profiles/shirley-strum.html…
SECTION 9 Cyber Security
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 2399319
المحتوى المقدم من Support and SECTION 9. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Support and SECTION 9 أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Just two people trying to do IT and Security the right way.
139 حلقات
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 2399319
المحتوى المقدم من Support and SECTION 9. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Support and SECTION 9 أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Just two people trying to do IT and Security the right way.
139 حلقات
كل الحلقات
×S
SECTION 9 Cyber Security


Time to start looking into cyber security frameworks. For this episode we’re looking at the the NIST Cyber Security Framework. We’re also explaining what a cyber security framework is and how they can help. LINKS 1. NIST Cyber Security Framework (CSF) FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


Time for another maintenance episode where we review our systems and management process. This time were looking at our Digital Ocean servers, Automox patch management, Fortinet Firewalls, and the password manager Bitwarden. FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


1 How do you roast a server to death? - 258 11:20
11:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب11:20
Almost roasted our VMware server to death. Don’t do what I did. Enjoy! LINKS 1. VMware Server: Super Micro SYS-E300-9D-8CN8TP 2. Fans: Noctua NF-A4x20 PWM FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


1 How do we evaluate the LastPass hack for Section 9? - 257 36:14
36:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب36:14
LastPass was hacked last year. As LastPass customers we need to evaluate the impact that has on Section 9. Should we continue to use the product? Should we migrate to a different password manager? How do we evaluate a password manager? Consider this the start of a longer conversation about LastPass and password managers. FIND US ON 1. Twitter - DamienHull 2. YouTube…
S
SECTION 9 Cyber Security


1 SANS and BHIS Videos for Hacking - 256 25:02
25:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب25:02
Found some really interesting and helpful videos. One walks you through an Active Directory hacking lab. Another talks about default configurations and bad passwords as a way to hack into systems. The last one is about building a home lab. These are just what I needed. LINKS 1. SANS Workshop – NTLM Relaying 101: How Internal Pentesters Compromise Domains 2. The Top $ num Reasons You Got Hacked in 2022 with Kent & Jordan | 1 Hour 3. How to Build a Home Lab for Infosec with Ralph May | 1 Hour FIND US ON 1. Twitter - DamienHull 2. YouTube…
S
SECTION 9 Cyber Security


Found a video that walks you through the process of setting up an Active Directory Lab for hacking. I wouldn’t be able to do this without a starting point. LINKS 1. Mitre ATT&CK Matrix 2. How to Build an Active Directory Hacking Lab FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


1 Using the MITRE ATT&CK Matrix in a lab - 254 21:35
21:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب21:35
Last episode was about my crazy study plan, or lack of one. Time to put together a proper study plan. One that works. FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


Last episode was about my crazy study plan, or lack of one. Time to put together a proper study plan. One that works. FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


Time to jump into my crazy, unorganized study process. Trying to study or learn the CISSP, pentesting, risk assessments, and keep up with my current certification requirements. I’ve also signed up for two Antisyphon classes. Beginner Classes 1. SOC Core Skills 2. Getting Started In Security With BHIS and Mitre Att&ck 3. Active Defense & Cyber Deception Advanced Classes 1. Introduction to Pentesting 2. Red Team: Getting Access 3. Professionally Evil CISSP Mentorship Program FIND US ON 1. Twitter - DamienHull 2. YouTube…
S
SECTION 9 Cyber Security


Time to create a policy for asset inventory. This will help us define what we need in our asset inventory. It will also help us define what we need in our procedures. The process we use to manage the inventory. LINKS 1. Enterprise Asset Management Policy Template FIND US ON 1. Twitter - DamienHull 2. YouTube…
S
SECTION 9 Cyber Security


1 Discovering Devices With runZero - 250 18:15
18:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب18:15
We’re scanning our network with runZero to get an inventory of devices. What did it find? What can we learn from this inventory? How well does it work? LINKS 1. runZero - Active discovery tool for asset inventory FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


1 Do we have adequate security controls in place? - 249 22:19
22:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب22:19
We’re in the process of implementing the CIS controls. This will take time. We’re also very busy. Are there any gaping security holes that we need to fix? Do we have any security controls in place? Can we wait to implement the CIS controls? LINKS 1. runZero - Active discovery tool for asset inventory 2. Enterprise Asset Management Policy Template FIND US ON 1. Twitter - DamienHull 2. YouTube…
S
SECTION 9 Cyber Security


1 CIS Controls: Hardware Inventory Part 1 - 248 13:07
13:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب13:07
Time to get an accurate inventory of the devices on our network. Once we have an inventory, we can move on to policies and procedures. LINKS 1. runZero - Active discovery tool for asset inventory 2. Enterprise Asset Management Policy Template FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


Time for another maintenance episode. This time were going back to the CIS Controls. This time were using version 8. Hoping to implement the first 7. FIND US ON 1. Twitter - DamienHull 2. YouTube
S
SECTION 9 Cyber Security


Time to start learning Azure. We’ve had Azure AD and Microsoft 365 for years. Just added Azure to the mix. Lots to learn. LINKS Free Azure Account FIND US ON 1. Twitter - DamienHull 2. YouTube
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.