
Podcasts Archives - Black Hills Information Security
180 episodes — Page 4 of 4
Talkin’ About Infosec News – 10/26/2020
Originally aired on October 26, 2020. The post Talkin’ About Infosec News – 10/26/2020 appeared first on Black Hills Information Security, Inc..
Talkin’ About Infosec News – 10/21/2020
Originally aired on October 21, 2020. The post Talkin’ About Infosec News – 10/21/2020 appeared first on Black Hills Information Security, Inc..
Webcast: What to Expect When You’re Expecting a Penetration Test
CJ and Bryan will share the knowledge they’ve accumulated, by helping 1,000’s of organizations determine what they need and don’t need when it comes to penetration tests and security assessments, […] The post Webcast: What to Expect When You’re Expecting a Penetration Test appeared first on Black Hills Information Security, Inc..
Webcast: What About Ransomware?
This is a joint webcast between Black Hills Information Security and the Wild West Hackin’ Fest conference. We hate ransomware. Like a lot. This is because we feel this is […] The post Webcast: What About Ransomware? appeared first on Black Hills Information Security, Inc..
Podcast: Passwords: You Are the Weakest Link
Why are companies still recommending an 8-character password minimum?  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend […] The post Podcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security, Inc..
Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD
BHIS’ Defensery Driven Duo Delivers Another Delectable Transmission! We know you are worried about your networks. After hours of discussion, we’ve come to the realization that some of our dedicated […] The post Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD appeared first on Black Hills Information Security, Inc..
Podcast: Attack Tactics 6! Return of the Blue Team
Download slides: https://www.activecountermeasures.com/presentations In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5!!! Originally recorded […] The post Podcast: Attack Tactics 6! Return of the Blue Team appeared first on Black Hills Information Security, Inc..
Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!
Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester […] The post Podcast: Weaponizing Corporate Intel. This Time, It’s Personal! appeared first on Black Hills Information Security, Inc..
BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it.
In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to […] The post BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it. appeared first on Black Hills Information Security, Inc..
BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.
Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box?  In this one-hour podcast, originally recorded as […] The post BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem. appeared first on Black Hills Information Security, Inc..
BHIS Podcast: Blockchain and You! InfoSec Edition
Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely […] The post BHIS Podcast: Blockchain and You! InfoSec Edition appeared first on Black Hills Information Security, Inc..
PODCAST: Sacred Cash Cow Tipping 2019
Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to […] The post PODCAST: Sacred Cash Cow Tipping 2019 appeared first on Black Hills Information Security, Inc..
PODCAST: RDP Logging Bypass and Azure Active Directory Recon
For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate […] The post PODCAST: RDP Logging Bypass and Azure Active Directory Recon appeared first on Black Hills Information Security, Inc..
PODCAST: BHIS Sorta Top Used Tools of 2018
In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about Nessus, Nmap, […] The post PODCAST: BHIS Sorta Top Used Tools of 2018 appeared first on Black Hills Information Security, Inc..
PODCAST: Raising Hacker Kids
Yes.. Ethical Hacker Kids. The holidays are coming up! Here John & Jordan cover the different games, tools and gifts we can give kids that help teach them the trade. […] The post PODCAST: Raising Hacker Kids appeared first on Black Hills Information Security, Inc..
PODCAST: Blue Team-Apalooza
Over the past few months, we have discovered a couple trends that organizations seem to be missing. No silver bullets, just some general vulnerability issues we are seeing again and […] The post PODCAST: Blue Team-Apalooza appeared first on Black Hills Information Security, Inc..
PODCAST: Creating & Keeping a Malware Zoo
Join John as he covers what he and the BHIS Systems team have been working on lately – creating a C2/Implant/Malware test bed. Testing our C2/malware solutions is important because […] The post PODCAST: Creating & Keeping a Malware Zoo appeared first on Black Hills Information Security, Inc..
PODCAST: John Strand’s 5 Year Plan into InfoSec Part 2
John Strand shares some of his own journey into information security and also his ideas and tips for those wanting to get into the industry from the start, or those […] The post PODCAST: John Strand’s 5 Year Plan into InfoSec Part 2 appeared first on Black Hills Information Security, Inc..
PODCAST: Beacon Analysis
Join special guest Chris Brenton, COO of Active Countermeasures, as he discusses the anatomy of beacons and why you need to be looking for them during a threat hunt. He […] The post PODCAST: Beacon Analysis appeared first on Black Hills Information Security, Inc..
PODCAST: What Is a Red Team, Anyway?
Dakota Nelson // Dakota talks about the pentester pyramid of pain and the different types of tests available from an information security firm. See his slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/7404264/ Extra links & […] The post PODCAST: What Is a Red Team, Anyway? appeared first on Black Hills Information Security, Inc..
PODCAST: From Active Countermeasures – Attack Tactics 4
Join John Strand as he continues his Attack Tactic series this time with the defense ideas for the attacks mentioned in episode 3 (see more here) To see the entire […] The post PODCAST: From Active Countermeasures – Attack Tactics 4 appeared first on Black Hills Information Security, Inc..
PODCAST: Active Directory Best Practices that Frustrate Pentesters
// Jordan Drysdale and Kent Ickler talk about Best Practices for setting up Active Directory. Bre joins as fake Sierra to host and ask questions from the audience since real […] The post PODCAST: Active Directory Best Practices that Frustrate Pentesters appeared first on Black Hills Information Security, Inc..
PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management
CJ Cox talks about the highs, lows, hows and why’s of security policy. // Show Notes Why are we doing this? Do you hate your audience? GDPR was bad enough. […] The post PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management appeared first on Black Hills Information Security, Inc..
PODCAST: Highly Caffeinated InfoSec
Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode here and look at the slides […] The post PODCAST: Highly Caffeinated InfoSec appeared first on Black Hills Information Security, Inc..
PODCAST: Attack Tactics Part 3: No Active Directory? No Problem!
John Strand talks about how BHIS pen tests companies who use the cloud. Want to know how you can defend against attacks in your cloud infrastructure? Keep your eyes peeled for […] The post PODCAST: Attack Tactics Part 3: No Active Directory? No Problem! appeared first on Black Hills Information Security, Inc..
PODCAST: Lee Kagan & Beau Bullock talk C2
Special guest Lee Kagan from RedBlack Security talks about his script, his previous guest posts and the future of C2 with Beau Bullock and Sierra. Check out these links: How […] The post PODCAST: Lee Kagan & Beau Bullock talk C2 appeared first on Black Hills Information Security, Inc..
PODCAST: Hacker Tools, Compliments of Microsoft
Sally Vandeven & David Fletcher // This is the podcast version of Sally & David’s webcast. For the whole webcast see our webcast post. Links that are mentioned in this […] The post PODCAST: Hacker Tools, Compliments of Microsoft appeared first on Black Hills Information Security, Inc..
PODCAST: Testing G Suites with MailSniper
Matt Toussain goes through how Mailsniper can be the penetration tester’s best friend. If you haven’t been using this tool in your tests you might start now! Check out the […] The post PODCAST: Testing G Suites with MailSniper appeared first on Black Hills Information Security, Inc..
PODCAST: Attack Tactics Part 2
John talked about how we’d attack, here’s how you can defend against those attacks. Grab the slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/ The post PODCAST: Attack Tactics Part 2 appeared first on Black Hills Information Security, Inc..
PODCAST: Attack Tactics Part 1
This is the audio only version of John’s webcast about how we would attack your company during a pentest. Grab his slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/ The post PODCAST: Attack Tactics Part 1 appeared first on Black Hills Information Security, Inc..