48 Hours – Paul’s Security Weekly #579
This week, we welcome Mark Dufresne, VP of Threat Research at Endgame for an interview, to talk about how MITRE created their tool and what the MITRE attack framework is! In our second feature interview, we welcome John Walsh, DevOps Evangelist at CyberArk to talk about Kubernetes, DevSecOps, and how to strengthen your container authentication with CyberArk! In the security news, how to use the Shodan search engine to secure an enterprise's internet presence, Apache access vulnerability could affect thousands of applications, vulnerable controllers could allow attackers to manipulate marine diesel engines, & ICS Security Plagued with basic, and avoidable mistakes! All that and more, on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode579 Visit https://www.securityweekly.com/psw for all the latest episodes! Sponsor Landing Page: www.endgame.com Sponsor Landing Page: www.conjure.org/asw Visit https://www.activecountermeasures/psw to sign
Full Audio
Segments
1. Mark Dufresne, Endgame –
Mark Dufresne explains why MITRE created their tool and what the MITRE attack framework is.
Full Show Notes: https://wiki.securityweekly.com/Episode579
Hosts




2. John Walsh, CyberArk –
John Walsh the DevOps Evangelist for CyberArk joins us on the show. John talks about the articles he wrote for CyberArk about Kubernetes, DevSecOps, and how to strengthen your container authentication with CyberArk.
Sponsor Landing Page: www.conjure.org/asw
Full Show Notes: https://wiki.securityweekly.com/Episode579
Host

3. Shodan, Apache, ICS, and Controllers –
How to use the Shodan search engine to secure an enterprise's internet presence, Apache access vulnerability could affect thousands of applications, vulnerable controllers could allow attackers to manipulate marine diesel engines, & ICS Security Plagued with Basic, and avoidable mistakes!
Full Show Notes: https://wiki.securityweekly.com/Episode579
Host

4. Shodan, Apache, ICS, and Controllers – Paul’s Security Weekly #579
How to use the Shodan search engine to secure an enterprise's internet presence, Apache access vulnerability could affect thousands of applications, vulnerable controllers could allow attackers to manipulate marine diesel engines, & ICS Security Plagued with Basic, and avoidable mistakes! Full Show Notes: https://wiki.securityweekly.com/Episode579 Follow us on Twitter: https://www.twitter.com/securityweekly
Host

5. John Walsh, CyberArk – Paul’s Security Weekly #579
John Walsh the DevOps Evangelist for CyberArk joins us on the show. John talks about the articles he wrote for CyberArk about Kubernetes, DevSecOps, and how to strengthen your container authentication with CyberArk. Sponsor Landing Page: https://www.conjur.org/asw Full Show Notes: https://wiki.securityweekly.com/Episode579 Follow us on Twitter: https://www.twitter.com/securityweekly
Host

6. Mark Dufresne, Endgame – Paul’s Security Weekly #579
Mark Dufresne explains why MITRE created their tool and what the MITRE attack framework is. Full Show Notes: https://wiki.securityweekly.com/Episode579 Follow us on Twitter: https://www.twitter.com/securityweekly
Host
