Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Paul's Security WeeklySubscribe
IOT, Patch management, Privacy, Endpoint Security, Endpoint Security

PSW #682

February 5, 2021
Section 0



Small federal contractors are being required to become compliant with a new standard, CMMC. They’ve never had to do the level of security and compliance maturity that it requires! What do they do? Who can they talk to? Visit https://www.securityweekly.com/psw for all the latest episodes!

Full Episode Show Notes

Starting A Non-Profit To Help Small Companies With CMMC

Guests

Josh Marpet

Josh Marpet –

COO at Red Lion

Hosts

Jeff Man

Jeff Man –

Sr. InfoSec Consultant at Online Business Systems

Joff Thyer

Joff Thyer –

Security Analyst at Black Hills Information Security

Larry Pesce

Larry Pesce –

Senior Managing Consultant and Director of Research at InGuardians

Lee Neely

Lee Neely –

Senior Cyber Analyst at Lawrence Livermore National Laboratory

Paul Asadoorian

Paul Asadoorian –

Founder at Security Weekly

Tyler Robinson

Tyler Robinson –

Managing Director of Network Operations at Nisos, Inc

Announcements

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

Audio

http://traffic.libsyn.com/sw-all/PSW_682_-_Josh_Marpet_Red_Lion-0_converted.mp3
Section 1



Bill will provide insight on best practices for internet safety, for work from home, family friendly internet habits which leads to the conversation of secure chats/files, & more! Visit https://www.securityweekly.com/psw for all the latest episodes!

Full Episode Show Notes

Quantum Computing & Finding the Truth

Guests

Bill DeLisi

Bill DeLisi –

CEO at GOFBA

Hosts

Jeff Man

Jeff Man –

Sr. InfoSec Consultant at Online Business Systems

Joff Thyer

Joff Thyer –

Security Analyst at Black Hills Information Security

Larry Pesce

Larry Pesce –

Senior Managing Consultant and Director of Research at InGuardians

Lee Neely

Lee Neely –

Senior Cyber Analyst at Lawrence Livermore National Laboratory

Paul Asadoorian

Paul Asadoorian –

Founder at Security Weekly

Tyler Robinson

Tyler Robinson –

Managing Director of Network Operations at Nisos, Inc

Announcements

  • If you missed Security Weekly Unlocked, you can now access all of the content on-demand, whether you registered before the live event or not, by visiting https://securityweekly.com/unlocked and clicking either the button to register or the button to login!

Audio

http://traffic.libsyn.com/sw-all/PSW_682_-_Bill_DeLisi_GOFBA-0_converted.mp3
Section 2



Security in a Complex World, Huawei’s HarmonyOS embodies “Fake it till you make it”, Hackers Infiltrating the World of Online Gaming, Sloppy patches breed zero-day exploits, Dutch researcher hacks prepaid vending machines, When was the last time you said: “Hey, that web app on that IoT/network device was really secure!”? Test Amber Alert accidentally sent out warning of Chucky from the Child’s Play horror movies, Major Vulnerabilities Discovered in Realtek RTL8195A Wi-Fi Module, New Linux malware steals SSH credentials from supercomputers, From Microsoft: how not to run Docker in Azure Functions. Visit https://www.securityweekly.com/psw for all the latest episodes!

Full Episode Show Notes

Vending Machine Hack, Chucky’s Amber Alert, HarmonyOS, & Realtek Vulns

Hosts

Jeff Man

Jeff Man –

Sr. InfoSec Consultant at Online Business Systems

Joff Thyer

Joff Thyer –

Security Analyst at Black Hills Information Security

Larry Pesce

Larry Pesce –

Senior Managing Consultant and Director of Research at InGuardians

Lee Neely

Lee Neely –

Senior Cyber Analyst at Lawrence Livermore National Laboratory

Paul Asadoorian

Paul Asadoorian –

Founder at Security Weekly

Tyler Robinson

Tyler Robinson –

Managing Director of Network Operations at Nisos, Inc

Announcements

  • Do you want to stay in the loop on all things Security Weekly? Visit https://securityweekly.com/subscribe to subscribe on your favorite podcast catcher or our Youtube channel, sign up for our mailing list, and join our Discord Server!

  • If you missed any of our previously recorded webcasts or technical trainings, they are available for your viewing pleasure at https://securityweekly.com/ondemand

Audio

http://traffic.libsyn.com/sw-all/PSW_682_-_news-0_converted.mp3

Related

Patch management
7 vulnerabilities patched in Axeda IIoT remote management tool, popular in medical sector

Joe UchillMarch 8, 2022

PTC sunset Axeda in 2019, but the industrial IoT remote monitoring and management agent is still in use in several systems. Based on Forescout telemetry, it is particularly popular in active use within the medical sector, particularly lab testing and imaging.

IOT
Healthcare sector saw largest increase in IoT malware attacks in 2021

Jessica DavisFebruary 17, 2022

SonicWall Cyber Threat report shows the rate of IoT malware attacks are heaviest against the healthcare sector, spotlighting the continued pressure on critical infrastructure.

IOT
More than 100 tech companies, cyber organizations rally around 5 baseline security standards for IoT devices

Derek B. JohnsonFebruary 17, 2022

The organizations – ranging from private companies like Google, Microsoft and Deloitte to non-profits like Consumer Reports, the Center for Internet Security, and the Cyber Threat Alliance – say there is a “global consensus” forming around core IoT security standards that must be addressed through a mix of government regulation and voluntary private sector action.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.