PLAY PODCASTS
Podcasts Archives - Black Hills Information Security

Podcasts Archives - Black Hills Information Security

180 episodes — Page 4 of 4

Talkin’ About Infosec News – 10/26/2020

Originally aired on October 26, 2020. The post Talkin’ About Infosec News – 10/26/2020 appeared first on Black Hills Information Security, Inc..

Nov 11, 202035 min

Talkin’ About Infosec News – 10/21/2020

Originally aired on October 21, 2020. The post Talkin’ About Infosec News – 10/21/2020 appeared first on Black Hills Information Security, Inc..

Nov 2, 202026 min

Webcast: What to Expect When You’re Expecting a Penetration Test

CJ and Bryan will share the knowledge they’ve accumulated, by helping 1,000’s of organizations determine what they need and don’t need when it comes to penetration tests and security assessments, […] The post Webcast: What to Expect When You’re Expecting a Penetration Test appeared first on Black Hills Information Security, Inc..

Aug 21, 20201h 26m

Webcast: What About Ransomware?

This is a joint webcast between Black Hills Information Security and the Wild West Hackin’ Fest conference. We hate ransomware. Like a lot. This is because we feel this is […] The post Webcast: What About Ransomware? appeared first on Black Hills Information Security, Inc..

Jul 13, 20201h 31m

Podcast: Passwords: You Are the Weakest Link

Why are companies still recommending an 8-character password minimum?  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend […] The post Podcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security, Inc..

Jan 17, 20201h 0m

Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD

BHIS’ Defensery Driven Duo Delivers Another Delectable Transmission! We know you are worried about your networks. After hours of discussion, we’ve come to the realization that some of our dedicated […] The post Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD appeared first on Black Hills Information Security, Inc..

Jan 7, 202058 min

Podcast: Attack Tactics 6! Return of the Blue Team

Download slides: https://www.activecountermeasures.com/presentations In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5!!! Originally recorded […] The post Podcast: Attack Tactics 6! Return of the Blue Team appeared first on Black Hills Information Security, Inc..

May 30, 201956 min

Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!

Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester […] The post Podcast: Weaponizing Corporate Intel. This Time, It’s Personal! appeared first on Black Hills Information Security, Inc..

May 11, 201956 min

BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it.

In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to […] The post BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it. appeared first on Black Hills Information Security, Inc..

Mar 18, 201954 min

BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box?  In this one-hour podcast, originally recorded as […] The post BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem. appeared first on Black Hills Information Security, Inc..

Mar 6, 201954 min

BHIS Podcast: Blockchain and You! InfoSec Edition

Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely […] The post BHIS Podcast: Blockchain and You! InfoSec Edition appeared first on Black Hills Information Security, Inc..

Feb 27, 201957 min

PODCAST: Sacred Cash Cow Tipping 2019

Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to […] The post PODCAST: Sacred Cash Cow Tipping 2019 appeared first on Black Hills Information Security, Inc..

Jan 15, 201946 min

PODCAST: RDP Logging Bypass and Azure Active Directory Recon

For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate […] The post PODCAST: RDP Logging Bypass and Azure Active Directory Recon appeared first on Black Hills Information Security, Inc..

Dec 28, 201853 min

PODCAST: BHIS Sorta Top Used Tools of 2018

In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about Nessus, Nmap, […] The post PODCAST: BHIS Sorta Top Used Tools of 2018 appeared first on Black Hills Information Security, Inc..

Dec 17, 201850 min

PODCAST: Raising Hacker Kids

Yes.. Ethical Hacker Kids. The holidays are coming up! Here John & Jordan cover the different games, tools and gifts we can give kids that help teach them the trade. […] The post PODCAST: Raising Hacker Kids appeared first on Black Hills Information Security, Inc..

Dec 4, 201846 min

PODCAST: Blue Team-Apalooza

Over the past few months, we have discovered a couple trends that organizations seem to be missing. No silver bullets, just some general vulnerability issues we are seeing again and […] The post PODCAST: Blue Team-Apalooza appeared first on Black Hills Information Security, Inc..

Nov 15, 201848 min

PODCAST: Creating & Keeping a Malware Zoo

Join John as he covers what he and the BHIS Systems team have been working on lately – creating a C2/Implant/Malware test bed. Testing our C2/malware solutions is important because […] The post PODCAST: Creating & Keeping a Malware Zoo appeared first on Black Hills Information Security, Inc..

Oct 9, 201841 min

PODCAST: John Strand’s 5 Year Plan into InfoSec Part 2

John Strand shares some of his own journey into information security and also his ideas and tips for those wanting to get into the industry from the start, or those […] The post PODCAST: John Strand’s 5 Year Plan into InfoSec Part 2 appeared first on Black Hills Information Security, Inc..

Sep 24, 201849 min

PODCAST: Beacon Analysis

Join special guest Chris Brenton, COO of Active Countermeasures, as he discusses the anatomy of beacons and why you need to be looking for them during a threat hunt. He […] The post PODCAST: Beacon Analysis appeared first on Black Hills Information Security, Inc..

Sep 17, 201848 min

PODCAST: What Is a Red Team, Anyway?

Dakota Nelson // Dakota talks about the pentester pyramid of pain and the different types of tests available from an information security firm. See his slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/7404264/ Extra links & […] The post PODCAST: What Is a Red Team, Anyway? appeared first on Black Hills Information Security, Inc..

Sep 10, 201836 min

PODCAST: From Active Countermeasures – Attack Tactics 4

Join John Strand as he continues his Attack Tactic series this time with the defense ideas for the attacks mentioned in episode 3 (see more here) To see the entire […] The post PODCAST: From Active Countermeasures – Attack Tactics 4 appeared first on Black Hills Information Security, Inc..

Aug 28, 201852 min

PODCAST: Active Directory Best Practices that Frustrate Pentesters

// Jordan Drysdale and Kent Ickler talk about Best Practices for setting up Active Directory. Bre joins as fake Sierra to host and ask questions from the audience since real […] The post PODCAST: Active Directory Best Practices that Frustrate Pentesters appeared first on Black Hills Information Security, Inc..

Aug 13, 20181h 1m

PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management

CJ Cox talks about the highs, lows, hows and why’s of security policy. // Show Notes Why are we doing this? Do you hate your audience? GDPR was bad enough. […] The post PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management appeared first on Black Hills Information Security, Inc..

Jul 30, 201850 min

PODCAST: Highly Caffeinated InfoSec

Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode here and look at the slides […] The post PODCAST: Highly Caffeinated InfoSec appeared first on Black Hills Information Security, Inc..

Jul 16, 201851 min

PODCAST: Attack Tactics Part 3: No Active Directory? No Problem!

John Strand talks about how BHIS pen tests companies who use the cloud. Want to know how you can defend against attacks in your cloud infrastructure? Keep your eyes peeled for […] The post PODCAST: Attack Tactics Part 3: No Active Directory? No Problem! appeared first on Black Hills Information Security, Inc..

Jul 16, 201849 min

PODCAST: Lee Kagan & Beau Bullock talk C2

Special guest Lee Kagan from RedBlack Security talks about his script, his previous guest posts and the future of C2 with Beau Bullock and Sierra. Check out these links: How […] The post PODCAST: Lee Kagan & Beau Bullock talk C2 appeared first on Black Hills Information Security, Inc..

Jul 12, 201844 min

PODCAST: Hacker Tools, Compliments of Microsoft

Sally Vandeven & David Fletcher // This is the podcast version of Sally & David’s webcast. For the whole webcast see our webcast post. Links that are mentioned in this […] The post PODCAST: Hacker Tools, Compliments of Microsoft appeared first on Black Hills Information Security, Inc..

Jul 2, 201851 min

PODCAST: Testing G Suites with MailSniper

Matt Toussain goes through how Mailsniper can be the penetration tester’s best friend. If you haven’t been using this tool in your tests you might start now! Check out the […] The post PODCAST: Testing G Suites with MailSniper appeared first on Black Hills Information Security, Inc..

Jun 20, 201846 min

PODCAST: Attack Tactics Part 2

John talked about how we’d attack, here’s how you can defend against those attacks. Grab the slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/ The post PODCAST: Attack Tactics Part 2 appeared first on Black Hills Information Security, Inc..

Jun 13, 20181h 1m

PODCAST: Attack Tactics Part 1

This is the audio only version of John’s webcast about how we would attack your company during a pentest. Grab his slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/ The post PODCAST: Attack Tactics Part 1 appeared first on Black Hills Information Security, Inc..

Jun 13, 201855 min