Big OSINT Data (with Josh Huff)

Maintaining a SOC (with Rob Gresham)

Maintaining a SOC (WITH Rob Gresham) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 37 GUEST:Rob Gresham February 20, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review …

About Joe Gray

Joe Gray is a native of East Tennessee. He joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Since leaving the Navy, Joe has lived and worked in St. Louis, MO, Richmond, VA, and Atlanta, GA. His primary experience is in the Information Assurance (IA) and Cyber Security compliance field. He has worked as a Systems Engineer, Information Systems Auditor, Senior UNIX Administrator, Information Systems Security Officer, and Director of IT Security. Joe is in pursuit of his PhD in Information Technology (with focus in Information Assurance and Security). His undergraduate and graduate degrees are also in Information Technology (with focus in Information Assurance and Security) from Capella University, where he graduated Summa Cum Laude for both degrees and completed a Graduate Certificate in Business Intelligence. He also is a part-time (Adjunct) Faculty at Georgia Gwinnett College. Joe holds the (ISC)² CISSP-ISSMP, GIAC GSNA, GCIH, CompTIA Security+, CompTIA Network+, and CompTIA A+ certifications. In his spare time, Joe enjoys reading news relevant to information security, blogging, bass fishing, and flying his drone in addition to tinkering with and testing scripts in R and Python.

Big OSINT Data (with Josh Huff)

Multi-Tool Multi-User HTTP Proxy (with Russel Van Tuyl)

Multi-Tool Multi-User HTTP Proxy (with Russel Van Tuyl) IF IT’S A PROTOCOL, YOU CAN PLAY WITH IT ADVANCED PERSISTENT SECURITY PODCAST EPISODE 26 GUEST: Russel Van Tuyl NOVEMBER 21, 2016 If you …

Big OSINT Data (with Josh Huff)

OSINT, Social Engineering, & the Election (with Ed Porter)

OSINT, Social Engineering, & the Election (with Ed Porter) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 25 GUEST: Ed Porter NOVEMBER 14, 2016 If you enjoy this podcast, be sure to give us a …

Big OSINT Data (with Josh Huff)

Critical Security Controls: Part 2 (with Brian Ventura)

Critical Security Controls: Part 2 (with Brian Ventura) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 24 GUEST: Brian Ventura October 31, 2016 If you enjoy this podcast, be sure to give us a 5 …

Big OSINT Data (with Josh Huff)

Critical Security Controls: Part 1 (with Brian Ventura)

Critical Security Controls: Part 1 (with Brian Ventura) (WITH BRIAN VENTURA) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 23 GUEST: BRIAN VENTURA October 24, 2016 If you enjoy this podcast, be sure to give …

Big OSINT Data (with Josh Huff)

Intro to App Sec (with Frank Rietta)

This episode we discuss Application Security (App Sec) from a high level and graze the surface on a few other vital security concepts and frameworks. We also discuss local happenings in the Security Community and other relevant topics in security.

BSides Knoxville (with Roger Seagle)

CSA Treacherous 12 Concerns: 1-4

Cloud Security is nothing new. However, it is growing in implementation and popularity. This is causing a ripple effect in terms of attacks originating in the cloud, attacking assets in the cloud, and using cloud resources for availability attacks. The purpose of this podcast is to discuss the CSA Treacherous 12 Concerns.

Ransomware Gaining Momentum

Jam Session: Ransomware Threat In 2016

We all know that Ransomware is a PITA (Pain in the ___). This podcast, we discuss modern examples, infection vectors, mitigations, and root causes. This podcast is meant to start the discussion with management to begin to prevent malware infections instead of scramble to decrypt files or pay the extortionists.

Big OSINT Data (with Josh Huff)

Mobile Insecurity (with Georgia Weidman)

Everyone wants to think about how secure they are. This podcast flips the script and assesses insecurity, specifically Mobile Insecurity. We discuss issues within the mobile computing ecosystem.

1. Current Event: Apple Quick Time and why could it not have been Flash. Georgia’s dad still uses Microsoft XP and won’t connect his printer to the network.
2. Georgia delivers her “Mobile Insecurity” talk and we discuss issues in the mobile threat landscape and possible mobile issues.
3. Mobile Malware, Ransomware, and MDM are discussed. Issues within the actual mobile Operating Systems are discussed briefly.
4. Joe asks if Georgia sees mobile devices distributing Ransomware and Malware to cars.
5. Quick banter of Apple vs FBI and the implications of the precedent both attempted and actually set.

This Week in Security

This week in Security: September 8 2015

This week in Security: September 8, 2015 Content This week in security, Ashley Madison data breach, the Jailbroken iPhone hack, and Netflix ceasing to use antivirus are discussed.We recap the …