De-Coder’s Ring

Consumable Security and Technology

Category: Podcast (page 1 of 2)

Podcast – Jon Bodner

This week, we branch out a little from the previous topics of Cyber Security, which we’ll be back to soon, don’t worry.   (that was a lot of commas in that sentence)

Today is an interview with Jon Bodner.  Jon is a very popular writer and speaker on all things software development, with a new focus on the Go programming language.  I’ll add a few notes here to find Jon’s various talks, but, please subscribe and listen to this episode!

You got your engineering in my data process

GopherCon2017 – Runtime Generated, Typesafe, and Declarative: Pick Any Three

The Story Behind Capital One’s Fork Of An Open Source Project

Podcast – John Lockie on Tech (part 2)

This week is another great interview with John Lockie.. well, really, it’s a continuation of last week’s that you can find here:  Podcast – John Lockie Interview (part one)

John goes straight to some solutions for networks (capture all the things) as well as credential monitoring (“they pop shell ridiculously easy”).

Listen to the knowledge!

Podcast – John Lockie Interview (part one)

Over the next few months, I plan on doing a big podcast binge on cybersecurity careers and will continue my focus on technology.

This week’s episode, John Lockie and I talk about his background and how it’s not the traditional path into cybersecurity if there really is one.  He affirms my beliefs in regards to CISOs with music degrees.  You’ll never guess what he says!

Find John on Twitter:  @thedefensedude

Please find and subscribe to the De-Coder’s Ring” in iTunes, and I’d be ecstatic if you gave me a great rating.

Leave feedback below about this episode!

 

Network Monitoring on the Cheap

I’ve regularly blogged about Suricata, Logstash and Elasticsearch.  Shoot, I’ve built multiple successful commercial tools using that technical stack.  The thing that made us successful wasn’t the tech, but it was how we used the tech to solve a problem that our customers had at that moment in time.

Now it’s time for me to share the secret on how to do it.

Ok, not a secret at all.  If you google, you can figure it out.

With this podcast, I want to introduce the topic to put some context around why those tools are the right tools.

I want to evangelize the idea of EVERYONE monitoring your home or work network with basic rules from places like Emerging Threats.  It’s free, and it’s invaluable to finding/stopping malware/viruses on your network.  Do it now!

Suricata

https://www.elastic.co/

https://redmine.openinfosecfoundation.org/projects/suricata/wiki/_Logstash_Kibana_and_Suricata_JSON_output

https://rules.emergingthreats.net/open/suricata-1.3/

Subscribe here : https://fauie.com/feed/podcast

Podcast – Breaches

Affected by Equifax?  Yahoo?    What do you do now….

a little bit of recent news, and some tidbits on how to deal with it.

 

Subscribe here : https://fauie.com/feed/podcast

Older posts

© 2017 De-Coder’s Ring

Theme by Anders NorenUp ↑