Exploring Information Security - Exploring Information Security

Timothy De Block
Exploring Information Security - Exploring Information Security

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

  1. 6月4日

    How to Perform Incident Response and Forensics on Drones

    Summary: In this episode of Exploring Information Security, host Timothy De Block sits down with Wayne Burke to discuss the crucial and rapidly evolving field of drone tactical forensics and incident response. Wayne sheds light on the increasing proliferation of drones, from law enforcement applications to criminal misuse, and the unique challenges involved in collecting forensic evidence from them. He reveals the dangers of booby-trapped drones and malware on flight controllers, emphasizing the need for caution and specialized techniques. Wayne also shares a fascinating incident involving electronic warfare against a surveillance drone, underscoring the sophisticated threats emerging today. Tune in to learn about essential forensic methods, from accessing flight logs with open-source tools to advanced chip-off forensics, and why collaboration in the cybersecurity community is vital for addressing these new challenges. What You'll Learn: What drone tactical forensics entails and its growing importance in today's world of automated robotics. The diverse and increasing applications of drones, including surveillance and the potential for misuse like extortion. Significant risks and dangers in drone forensics, such as booby traps and flight controller malware. Initial steps and varied techniques for drone incident response and forensic evidence collection, depending on the drone type. How flight logs and telemetry data are analyzed using open-source tools, and methods for advanced forensics like chip-off analysis. The critical role of community and collaboration in addressing emerging drone security threats.

    25 分钟
  2. 6月3日

    That Shouldn't Have Worked: A Red Teamer's Confessions

    Summary: In this episode of Exploring Information Security, host Timothy De Block speaks with Corey Overstreet, a seasoned pentester from Red Siege. Corey shares insights into the ongoing cat-and-mouse game between red teams and blue teams, revealing common vulnerabilities and unexpected successes in breaching defenses. He discusses his upcoming talk at Show Me Con, titled "That Shouldn't Have Worked," which aims to equip blue teams with practical knowledge on bolstering their defenses against persistent attackers. From the nuances of payload delivery to the surprising resilience of old tricks and the challenges of cloud security, Corey offers a candid look at the daily realities of offensive security and how defenders can truly make a red teamer's life difficult. What You'll Learn: The core focus of Corey Overstreet's "That Shouldn't Have Worked" talk at Show Me Con. Common mistakes red teamers make and how to avoid them. Effective defensive strategies for blue teams, including the power of application control and network segmentation. The evolving landscape of EDR and how AI is starting to make red team operations more challenging. Insights into the surprising ways macros and social engineering continue to be effective entry points, especially in cloud environments. Advice for aspiring pentesters on learning and problem-solving, emphasizing hands-on practice and diligent note-taking. Corey's favorite resources for staying up-to-date in cybersecurity, including various subreddits, Discord, and Slack communities.

    46 分钟
4.7
共 5 分
43 个评分

关于

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

你可能还喜欢

若要收听包含儿童不宜内容的单集,请登录。

关注此节目的最新内容

登录或注册,以关注节目、存储单集,并获取最新更新。

选择国家或地区

非洲、中东和印度

亚太地区

欧洲

拉丁美洲和加勒比海地区

美国和加拿大