Completely Forgotten – ASW #112
Full Audio
View Show IndexSegments
1. Using IaC to Establish & Analyze Secure Environments – Cesar Rodriguez – ASW #112
Teams building Infrastructure as Code still need to ensure that the infrastructure deployed matches the code they created. Not only can IaC help establish secure environments, analyzing that code can help identify when environments have drifted from security baselines or even highlight when misconfigurations lead to exploitable vulns.
To learn more about Accurics, visit: https://securityweekly.com/accurics
Announcements
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
Security Weekly is an official media partner for Virtual BlackHat 2020! To register and save $200, visit https://securityweekly.com/summercamp2020 and click the register button. Discount code: "20SecWeekbh" Alongside Virtual BlackHat, we will be running our conference micro-interviews, you guessed it, virtually, in an event called Security Weekly Virtual Hacker Summer Camp, August 3 - August 6, 2020. Options, pricing and availability are all listed on the same page! Reserve your slot now to get your message out to BlackHat attendees!
Guest
Cesar is the Head of Developer Advocacy at Accurics and has spent the last 10+ years working in the cloud security space, securing both private cloud in the military industry and public cloud in the financial sector. He is passionate about contributing to the developer community through open source projects (Terrascan), blogs, and participating in local meetups.
Hosts
2. DLL Hijacking, Trust Through Privacy, & Adobe EOL Data – ASW #112
DLL Hijacking at the Trend Micro Password Manager, Adobe Prompts Users to Uninstall Flash Player As EOL Date Looms, The State of Open Source Security 2020, Microservices vs. Monoliths: Which is Right for Your Enterprise?, What Modern CI/CD Should Look Like, and Build trust through better privacy!
Announcements
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
We're always looking for great guests for all of the Security Weekly shows! Submit your suggestions by visiting https://securityweekly.com/guests and completing the form!