The Linux Security Podcast covers key concepts in security, reviews some of the latest exploits and discusses the tools enterprises use to detect, prevent and recover from cyber attacks. The show features insights from Mike Shinn, co-founder and CEO of Atomicorp, and Scott Shinn, co-founder and CTO of Atomicorp as well as PM for OSSEC. Scott was also chief network manager at the White House and interim CISO at the Department of the Interior earlier in his career. Mike contributed to the first intrusion detection device and was the first computer security analyst for the White House. He is also the author of the federal regulation for Cybersecurity Programs for Nuclear Facilities. The Shinn brothers have been working with Linux since before 1.0, been in computer security for 25 years and are the co-authors of Troubleshooting Linux Firewalls.
What are Red Teams and Why They Exist
Red Teams have become a common tool for testing enterprise security. They attempt to penetrate security defenses as if they were hackers. Red teams are motivated to be creative and determine the best way to circumvent security measures in place, sometimes by any means possible. Mike has been red teaming since the 1990's, before the term existed. He breaks down how red teams operate, their objectives, the difference between physical and digital vulnerabilities and how constraints can limit their value.
Why Hackers Hack. It's Not Why You Think.
Why do hackers hack into your networks and devices? Many people think it's for credit card data, PII or to steal intellectual property. This is sometimes true, but there are other reasons. What you value about your assets is often different from what hackers value. We are now seeing hackers break into networks so they can leverage the computing resources cryptocurrency mining. Atomicorp CEO Mike Shinn walks through hacking history and how cyber defense should begin with understanding attacker incentives.
What is Virtual Patching and How Can it Enhance Security
Virtual patching is a way of implementing a security policy to eliminate or mitigate a vulnerability. It is not actually patching, but is a way to do something quick and external to the application. Why not just use a patch? Sometimes there is no patch available and other times speed is of the essence. And, patches sometimes introduce risk that something will break. Atomicorp CEO Mike Shinn developed some of the earliest virtual patches and explains what they are and why they are gaining in popularity.
SQL Injection Attacks, How They Work and the Problem with Defending Against Them
SQL Injection Attacks are a method for taking advantage of flaws in the way an application is written. In particular, they exploit vulnerabilities that offer direct access to databases. Mike Shinn, CEO of Atomicorp, has employed SQL injections in Red Team exercises and built countermeasures that defend against them. In this week's episode Shinn talks about SQL Injections, the typical vulnerability of databases, the high frequency of the risk and common methods for defending against the attacks.
CVEs Explained. What They Are and How They're Used
The Common Vulnerabilities and Exposures (CVE) system is a critical tool for the cybersecurity industry. CVEs provide consistency in naming and clarity on the nature and impact of various vulnerabilities. In this week's Linux Security Podcast, Atomicorp CEO Mike Shinn discusses the origin and management of the CVE process, how it's used by cybersecurity professionals and why it's so important. He also discusses how vulnerability management systems are perpetually hobbled by the limitations of the CVE system.
Efail Vulnerability and its Impact on Encrypted Email
The Efail vulnerability has been in the news and has many people rushing to remove encryption from their email clients. The vulnerability does impact S/MIME and PGP users, but only a subset. That means a lot of people are removing encryption from their email unnecessarily and putting themselves at risk. Atomicorp CEO Mike Shinn discusses what Efail is, how the exploit works and why the notification process was handled poorly. If you ever need email encryption, you should definitely listen to this episode.