Press "Enter" to skip to content

Lake Street El

Episode 103 – Top 10 Security Tips For Your Network – 1 – Use Strong Authentication

A new mini-series, Top 10 Security Tips For Your Network. Instead of quickly listing off a top 10 list there will be one episode for each item. The first tip is about using strong authentication anywhere applicable to help strengthen your security and reduce your reliance on bad password practices by users.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 102 – OWASP Top 10 – A3 – Cross Site Scripting

Next in the OWASP Top 10 series is number 3, Cross Site Scripting (XSS). This vulnerability is the most common of the Top 10. It can open your application to user impersonation, session stealing to data dumps. This episode goes over what XSS is and some of the steps and resources you can use to help prevent them.

OWASP XSS Page

OWASP XSS Cheat Sheet

Types of XSS

 

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 101 – Email Sucks, Stop Using It, Communicate More Effectively

Email needs to go, it's a security nightmare, it's a pain to manage and it has become an inefficient method of communication. Look at your inbox, how much time do you spend 'cleaning it out', messages skipped over or skimmed, and time going back and forth with broken messages. 

It's time for email to evolve and this episode goes into how it can do that.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 100 – Thank You For The First 100 Episodes

When I first started this podcast I never would have thought I'd be recording my 100th episode. It's all because of the listeners and feedback received.

Thank you and let's get to 200!

Be aware, be safe. 

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 99 – Tips, Tricks and Tools – SpyBot

This week's TTT Episode covers a great malware scanner for your Windows computers. SpyBot - Search & Destroy is a tool I have been using for over 10 years. It's a deep, easy to use malware scanner to help identify unwanted installations and remove any malicious components. It's a great addition to any scanning toolbox.

Disclaimer - All tools and downloads in my TTT episodes are unsponsored and are 100% my personal opinion and recommendation. Meaning I am not paid to talk positively about them...

SpyBot Product Page

Download SpyBot

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 98 – Create A Culture Of Security To Be Successful

Building a successful security program in any company is difficult. There's a way to help it become successful and a way to make it be rejected and ineffective. This episode goes into why you should work on a culture based approached to your security program. 

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 97 – You Have No Expectation Of Privacy On Business Systems

There is a balance between business use and personal on computers and systems businesses provide to employees. Personal use is inevitable, a personal email to your wife, saving off a photo and so on. If you do store personal files or use company email for personal messages you cannot expect those to remain private to you. This episode goes into what it means to use a company provided resources for personal purposes and why you cannot expect it to remain private. 

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 96 – OWASP A2 – Broken Authentication And Session Management

Continuing with the OWASP Top 10 series we are on number 2, Broken Authentication and Session Management. What is it? How can be exploited? This episode breaks down what this covers and why it's number two in the Top 10. 

OWAPS A2 - Broken Authentication And Session Management

OWASP Application Security Verification Standard Project

OWASP Session Management Cheat Sheet

OWAPS Authentication Cheat Sheet

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 95 – Release The KRACKen! Update All Your WiFi Devices NOW!

Last week a report was released showing how the WPA2 WiFi Encryption Protocol can be compromised. This is a serious security alert as it affects every WiFi device you own. Laptops, phones, game consoles, TVs, streaming devices and anything else that uses WPA2 for their WiFi connection. This episode breaks down what this means for you and how to protect yourself.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

Episode 94 – Tips, Tricks and Tools (TTT Episode) – VirusTotal

Going forward, each Friday I will do a TTT Episode. Tips, Tricks and Tools will highlight one of the many, many tools and tricks I use daily in my security profession. In security you can never have too many tools because there is no single tool that can do it all. 

The first episode will cover a website called VirusTotal. 

Tool - VirusTotal

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 93 – Why You Shouldn’t Accept Every LinkedIn Connection Request

LinkedIn is the social network for our professional persona. Our careers and business contacts kept separate form our personal social lives. On LinkedIn we tend to accept connections more freely than on our personal social sites. Even though we are out to increase our business contacts and reputation there are those that are out there that are up to no good. This episode goes into what you are exposing to a LinkedIn connection and how that can increase your security risks.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 92 – What Is Two Factor Authentication And Why You Should Enable It Now

There are three factors of authentication - What You Know, What Your Have and What You Are. A basic username/password combo is no longer sufficient to protect your accounts and data. This episode goes into what multi factor authentication is and why you should enable it on your accounts now. 

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 91 – OWASP Top 10 – A1 Injection

The first in a series of ten episodes going over each of the OWASP Top 10 items. A1 deals with Injection. This episode goes over the very high level description on what it is, how it's exploited and the damage that can be done.

Reference Links:

A1 Injection Page

SQL Injection Prevention Cheat Sheet

Query Parameterization Cheat Sheet

OWASP SQL Injection Testing Guide

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 90 – How Not To Fall For The Apple iOS Phishing Attack

Phishing is the technique to trick a victim to enter their account credentials into an app or website they think is legit. In reality it's a fake site and they send their account information to a criminal element. Apple iOS is not immune to these types of real looking tricks. This episode goes into tips on how you can help identify and avoid falling for this phishing attack.

Be aware, be safe. 

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

Episode 89 – Book Review: Secure Enough? by Bryce Austin

This episode I review the book Secure Enough? 20 Cybersecurity Questions For Business Owners and Executives by Bryce Austin.

Amazon Link.

Goodreads Link.

TCE Strategy, Bryce's Website.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

BONUS EPISODE – Tech Scammer Recorded, Learn What They Are

I received one of those tech support scam phone calls today. I am usually more prepared for them but it took me a few minutes to get prepared to record it. This episode shows you what these tech scam calls sound like, what they say and have you do and ultimately how to avoid them. 

This was unscripted and recorded on the fly. Enjoy.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

Episode 88 – Security Assessments Are Only Good At The Time You Conduct One, Do More

Security and Risk Assessments are a critical components of a security program. You will see that regular assessments will be asked for more often by regulations, partners and departments. They are the reasons for any security initiatives and are also the proof of your effectiveness of decreasing risk for the company. This episode goes into why you need do assessments more frequently. 

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 87 – In Security You Need To Answer The Hardest Question, So What?

So What? What does this mean to me? That's the question that you need to answer. Depending on who you talk to, the answer will be different. In Security you need to apply it to those questions, So What? It's the hardest question to answer, but if you don't your adoption of any security initiatives will be near impossible.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

iHeartRadio - Security In Five Channel

Email - contactme@binaryblogger.com