Monthly Archives: March 2011

Security Weekly – Security Weekly – Episode 236 – March 24th 2011

Fully packed show! Chris Nickerson and Eric Smith come on to talk about PTES, the new standard to executing penetration tests. Kevin Fiscus does an interview about risk management, helping customers, and more! Bugbear does a technical segment that will make you think twice about timestomping (NTFS MFT FTW), and the crew talks stories, including RSA, Comodo, and more!

Episode 236 Show Notes

Episode 236 Direct Audio Download

All the Paul's Security Weekly episodes on our Bliptv archives.

Hosts: Paul Asadoorian,John Strand,Larry Pesce

Audio Feeds:

Security Weekly – Security Weekly – Episode 235 Part 2 – March 17th 2011

Georgia "Troublemaker" Weidman joins us to discuss her experiences at the Mid-Atlantic CCDC competition as both a blue team member, and an incarcerated red team member. Then she discusses how her quest for a method of preventing embarrassing drunken texting led to her research in to the bot net control using sms. Can you hear me now? I thought so...

Episode 235 Show Notes

Episode 235 part 2 Direct Audio Download

All the Paul's Security Weekly episodes on our Bliptv archives.

Hosts: Paul Asadoorian,John Strand,Larry Pesce

Audio Feeds:

Security Weekly – Security Weekly – Episode 234 – March 10th 2011

Paul's Security Weekly from the Mid-Atlantic Collegiate Cyber Defense Competition for 2011. Where they discuss cyber defense of cyber assets by being a cyber warrior to fight the cyber criminals and the cyber thieves. Then we have a cyber podcast where we discuss some cyber news about cyber events all over the cyber sphere. So join cyber Paul, cyber Larry, Cyber John, Cyber Carlos, and last and certainly not least Intern Cyber for this cyberific podcast.

Episode 234 Show Notes

Episode 234 Direct Audio Download

All the Paul's Security Weekly episodes on our Bliptv archives.

Hosts: Paul Asadoorian,John Strand,Larry Pesce

Audio Feeds:

Security Weekly – Security Weekly – Episode 233 part 2 – March 3rd 2011

Ray Davidson takes ShmooCon to college. Larry continues on with his love for "The Sheen Machine". Then a better suite of stories for the week are discussed.

Episode 233 Show Notes

Episode 233 part 2 Direct Audio Download

All the Paul's Security Weekly episodes on our Bliptv archives.

Hosts: Paul Asadoorian,John Strand,Larry Pesce

Audio Feeds:

Security Weekly – Security Weekly – Episode 233 part 1 – March 3rd 2011

Sharon Conheady on the history of social engineering, con-artistry, and the bamboozler. All this and more on a internless 233 part 1. I will be back next week and hope it sounds better.

Pretty sad to represent Sharon on the show, who has a beautiful voice by the way... we have an image of who else.. JOHN STRAND everyone.

Episode 233 Show Notes

Episode 233 part 1 Direct Audio Download

All the Paul's Security Weekly episodes on our Bliptv archives.

Hosts: Paul Asadoorian,John Strand,Larry Pesce

Audio Feeds:

With New Cyber Terror Threats, Investing In Cyber Security Is More Important Than Ever


In our times, network security is the most critical aspect and function of any business; almost all business are connected to online data in some way.  Even smaller companies such as small music store chains have specific email passwords and critical data that can be easily hacked by criminals.  To avoid these types of issues and to eliminate the chances of such security breaches, computer network security should be your number one priority.  There are criminals out there unlike what the world has previously witnessed; these are not people who wait to break in to your business at night.  The modern criminal is rapidly becoming a cyber threat; unseen, unheard and many times unstoppable to those who do not have proper cyber security.
                The threat is growing across the world as well; enemies of America and other countries throughout the world are rapidly planning more cyber-attacks than ever before.  Federal institutions have had their websites targeted and taken over by terror organizations, and the threat continues to grow.  It is only a matter of time before terrorist cells will see the harm they can cause by targeting the websites of average, everyday business, and conduct terror opportunities through the internet and cyberspace.  Network security should be more important than ever to every business owner; why take the risk of losing the trust of your customers and employees?  Protect your business from the unseen threats in the world, just as you would protect it from physical threats.