Independent Security Evaluators
Independent Security Evaluators
  • Видео 59
  • Просмотров 28 138
Ethical Hackers vs. Vulnerability Scanners - Webinar
Join Senior Solutions Consultant Ben Schmerler and Security Analyst Joel St. John for a discussion on the pros and cons of relying on vulnerability scanners, and why manual assessments matter.
Просмотров: 60

Видео

Tech Done Different [Ep 95]: Showing Vulnerability as a Leader
Просмотров 10Год назад
Ben sits down with Wayne Haber, the Director of Engineering at GitLab. The two talk about everything from where attackers get their motivation to why showing your team your vulnerabilities is healthy for you and them. You’ll Learn: - How to make remote work most effective for you and your team - why we need to change our expectation on instant response for ourselves and our team members - How a...
Tech Done Different [Ep 94]: Security at the Intersection of Digital and Physical Devices
Просмотров 4Год назад
This week the guys sit down with Ryan Barnett, the Senior Engineering Manager at Fort Robotics. The three discuss, at the speed technology is evolving, why it’s so important to prioritize security. You’ll Learn: - The difference in security when discussing robotics and autonomous systems - How to balance physical safety and device security while ensuring proper operation in the machinery - What...
Tech Done Different [Ep 93] Big Dreams and Small Budgets
Просмотров 9Год назад
On this week’s episode Ted and Ben chat with, the CTO whisper, Kathy Keating. Kathy helps guide first time and less experienced CTOs to build the skills they can’t acquire overnight. You’ll Learn: - About some of the challenges an early stage startup might have when hiring Senior Engineer for a CTO position - Which skills these new CTOs need to learn when they hit the ground running - Why it’s ...
Tech Done Different [Ep 92] Stories From a Digital Forensics and Incident Response Specialist
Просмотров 15Год назад
Ted and Ben meet with Jana Odineca, the CTO and Founder at ORNA. The three sit down to discuss, how Jana and her team help companies after a cyber attack. Finally, she goes in depth on what companies should be doing before an attack even happens. You’ll learn: - What happens when an insider threat attacks their own company - Why a one man IT and Security department, no matter your company size,...
Tech Done Different [Ep 91] CTO Excellence
Просмотров 35Год назад
On this episode Ted sits down with Best Selling Author and Founder of 7CTO’s Etienne de Bruin. The long time friends discuss what CTOs get right and wrong in their roles. You’ll Learn: - Why Etienne felt this was the right time to publish his book - What you need to do in the first 100 days as a new CTO at a company - The different issues a new CTO may encounter vs. a CTO who is promoted within...
Tech Done Different [Ep 90] Knowing When to Pivot
Просмотров 5Год назад
This week Ben and Ted are joined by Ian Hamilton, the CTO of Signiant. The three discuss how Signiant has transformed as the tech industry evolved over the last 20 years to insure the company can pivot with the market. You’ll learn: - When you should pivot - How to get past the fear of transitioning from something that works right now to what you see being the future of your industry - How to g...
Tech Done Different [Ep 89]: Why be a Mentor
Просмотров 9Год назад
This week Ted sits down with David Tyler, the Founder and CEO of Cyber Mentor DoJo. The two discuss why it’s so important to share with others, the knowledge professionals have acquired over time. You’ll Learn: - Why mentorship is important - Why we need to build mentorship into our community - Why your mentor doesn’t always need to be in your job field - What a group mentoring can offer that’s...
Tech Done Different [Ep 88]: Thinking Like a Bad Guy
Просмотров 17Год назад
This week’s special guest is Ethan Dietrich, SIXGEN’s Founder and CEO. Ethan joins the guys to discuss what cyber security looks like from a black hat hackers point of view and how his team uses the information collected to level the playing field. You’ll Learn: - What a day looks like when thinking and acting like the bad guy - How attackers stay anonymous - How can we level the playing field ...
Tech Done Different [Ep 87]: Who are Nation-State Threats
Просмотров 3Год назад
This week Ted and Ben talk with a Cyber Warfare Specialist, Brian Contos. Brian joins our hosts to discuss how cyber threats have change in his 25 year career and how they have learn to adapt with the times. You’ll Learn: - Who owns the security responsibility in a business - Why xIoT needs to be included in a business' security plan - What does a nation-state actor look like - How do threats e...
Tech Done Different [Ep 86]: Embodying Authenticity
Просмотров 52Год назад
This week Ted and Ben are joined by Nick Hughes, the CEO of EITR Technologies. They discuss why being your authentic self, from your social media posts, to branding, to your personal interaction with clients will draw people into wanting to work with you more than buzz words ever will. You’ll Learn: - Why we need to stop branding ourselves “Thought Leaders” and instead let the world around us c...
Tech Done Different [Ep 85]: Ethical Baby Thief
Просмотров 11Год назад
This week's episode of Tech Done Different features Ben interviewing Andrew Lemon, Principal Security Engineer at Red Threat. They talk about what it means to be a "good hacker". You will learn: - Why "cut and paste" penetration tests miss the point - The mindset of learning to become an ethical hacker - What can make a security assessment fun and exciting - Why "stealing a baby" can actually b...
Tech Done Different [Ep 84]: Lean Into Your Digital Senses
Просмотров 6Год назад
This week’s episode of Tech Done Different features Debasish Biswas, CTO of Aware. Ben sits down and talks with Debasish about collaboration and how we should think about the permanent changes in the way people work for the better. You will learn: - What your “digital senses” are - How to think about securing information when it exists in many different platforms - Why we shouldn’t look as virt...
Tech Done Different [Ep 83]: Chatting with a Hacker
Просмотров 17Год назад
Matt Brown literally makes a living hacking things (and, as we learned on this episode, would probably still do it even if he had unlimited money). Join Ted and Ben in a fun interview with a hacker talking about all things hacking. You’ll learn: - What common assumption leads to many security failures - How both businesses and consumers can think about better securing their solutions - What Bui...
Tech Done Different [Ep 82]: Think about Grit
Просмотров 26Год назад
On this week's episode of Tech Done Different, Ben is joined by Cody MacDonald the CTO of IPT Global. Ben and Cody sit down to talk about why it’s never too late to reinvent yourself and your career. You'll learn: - How Cody went from a Cherry Farmer, to Geologist, to CTO of a software company - why the more something makes you uncomfortable the more you need to pursue it - How to handle the st...
Tech Done Different [Ep 81]: Scientists are Artists
Просмотров 22Год назад
Tech Done Different [Ep 81]: Scientists are Artists
Tech Done Different [ep 80]: Creativity & Innovation
Просмотров 12Год назад
Tech Done Different [ep 80]: Creativity & Innovation
Tech Done Different [ep 79]: CyberPunk Is Dead
Просмотров 20Год назад
Tech Done Different [ep 79]: CyberPunk Is Dead
Tech Done Different [ep:78] Problems Worth Solving
Просмотров 14Год назад
Tech Done Different [ep:78] Problems Worth Solving
Tech Done Different [ep:77] Be Natural, Be Yourself
Просмотров 6Год назад
Tech Done Different [ep:77] Be Natural, Be Yourself
Tech Done Different [Ep 76]: Changing Buyer Behavior
Просмотров 9Год назад
Tech Done Different [Ep 76]: Changing Buyer Behavior
Tech Done Different [Ep 75]: Analyzing Security Research
Просмотров 102 года назад
Tech Done Different [Ep 75]: Analyzing Security Research
Tech Done Different [Ep 74]: Creating a Vision Statement
Просмотров 182 года назад
Tech Done Different [Ep 74]: Creating a Vision Statement
Tech Done Different [Ep 73]: Fear Less, Not Fearless
Просмотров 342 года назад
Tech Done Different [Ep 73]: Fear Less, Not Fearless
Tech Done Different [Ep 72]: Gut and Common Sense
Просмотров 332 года назад
Tech Done Different [Ep 72]: Gut and Common Sense
Tech Done Different [Ep 71]: Adapt to Change
Просмотров 282 года назад
Tech Done Different [Ep 71]: Adapt to Change
Tech Done Different [Ep 70]: Web 3.0 Security
Просмотров 242 года назад
Tech Done Different [Ep 70]: Web 3.0 Security
Tech Done Different [Ep 69]: Why VRM Needs Customization
Просмотров 162 года назад
Tech Done Different [Ep 69]: Why VRM Needs Customization
Tech Done Different [Ep 68]: Remove Friction
Просмотров 152 года назад
Tech Done Different [Ep 68]: Remove Friction
Tech Done Different [Ep 67]: Threat Intelligence
Просмотров 1102 года назад
Tech Done Different [Ep 67]: Threat Intelligence

Комментарии

  • @Pinkmen-ho3fz
    @Pinkmen-ho3fz 4 месяца назад

    This guy bullied a young fan and he mistreats his employees just like mike mood

    • @Crepis
      @Crepis День назад

      First part true second part CAP

    • @Pinkmen-ho3fz
      @Pinkmen-ho3fz 22 часа назад

      Well several employees have said he doesn’t pay them fairly,he fires them when they want a pay rise,he is also accused of sexism and also him bullying eckrocoster was just crook. I really don’t like him or his game

  • @Pinkmen-ho3fz
    @Pinkmen-ho3fz 4 месяца назад

    I hate Zach Belanger he is as bad as mike mood

  • @xanh350
    @xanh350 Год назад

    He said When the market is at its high and eth was worth $1000 he had 44 million dollars.....At todays value he has just 4 million, so he lost 40 million dollars and he laughed with smirks Ok, now after your video eth moved to be worth $4000 dollars, so he should of have 170 million dollars, so he went from 4 million to 170 million, so istead of losing 40 million with ur laughs, he just won 168 million dollars had he sold at 4000, but then crypto market got into bear state right now and do u know what ETH worth right now with its BEAR state? its $1900 lol....so he still up from that 4 million which u laughed about. This last comment alone showed me how dumb this person is.

  • @Nick-ms6ii
    @Nick-ms6ii Год назад

    Will the IoT village be there this year?!

  • @joellarichard8611
    @joellarichard8611 Год назад

    Promo*SM

  • @mysterychannel6577
    @mysterychannel6577 Год назад

    He just cashed out 50 mil a couple weeks ago

  • @mysterychannel6577
    @mysterychannel6577 Год назад

    how to scan so many keys?

  • @andrewchoi5808
    @andrewchoi5808 Год назад

    Make earth humanity nature wildlife environment biodiversity cities towns and 200 100% strong smart bright renewable ageless beautiful eco friendly sustainable solarpunk immortal utopian resilient peaceful safer healthier anachronistic future

  • @andrewchoi5808
    @andrewchoi5808 Год назад

    Erase bad evil dystopian cyberpunk aging diseases old age mortality sickness illness death fossil fuel pollution extinction horror cruel crime futures

  • @maxijazz1002
    @maxijazz1002 Год назад

    11:43 - backdoor????? wtf?????

  • @mynadapvaala8986
    @mynadapvaala8986 2 года назад

    𝓟Ř𝔬𝓂𝔬𝐒ϻ 💦

  • @Beamierdig
    @Beamierdig 2 года назад

    I love to Seth Belanger speak?

  • @abyrvalg809
    @abyrvalg809 2 года назад

    music must be louder, because you upload video for music, not for speaker

  • @CubicalStudios
    @CubicalStudios 2 года назад

    I love working at Mob Entertainment, it’s great

    • @nswtrains3153
      @nswtrains3153 8 месяцев назад

      Omg hi mob entertainment worker also I have a small question will bron appear for a tiny bit in chapter 3

    • @egegsg2626
      @egegsg2626 5 месяцев назад

      What will be about poppy playtime chapter 4

  • @micheledale8409
    @micheledale8409 2 года назад

    🤭 ρяσмσѕм

  • @albertri
    @albertri 3 года назад

    How to secure your terramaster NAS if you already have one?

  • @btcsahil850
    @btcsahil850 3 года назад

    0x7E5F4552091A69125d5DfCb7b8C2659029395Bdf🔑0x0000000000000000000000000000000000000000000000000000000000000001 0x4C636a08FDF3692A9bCa111e8a7F4A0E28Eb4457🔑0x0000000000000000000000000000000000000000000000000a00000000000000

  • @christyler7221
    @christyler7221 3 года назад

    I couldn't never had believe that I will still have access to my funds again if not for 𝑻𝒕𝒆𝒄 𝑜𝑛 𝑊𝒉𝑎𝑡𝑠𝐴𝑝𝑝 𝑐𝑜𝑛𝑡𝑎𝑐𝑡 𝒉𝑖𝑚 𝑣𝑖𝑎+1 (657) 443‑5112 _or 𝗖𝗹𝗼𝘄𝗻𝘁𝗼𝗼𝗹𝘀_ 𝗼𝗻 _¶π$𝘁𝗮𝗴𝗿𝗮𝗺_who erased my doubt

  • @christyler7221
    @christyler7221 3 года назад

    I couldn't never had believe that I will still have access to my funds again if not for 𝑻𝒕𝒆𝒄 𝑜𝑛 𝑊𝒉𝑎𝑡𝑠𝐴𝑝𝑝 𝑐𝑜𝑛𝑡𝑎𝑐𝑡 𝒉𝑖𝑚 𝑣𝑖𝑎+1 (657) 443‑5112 _or 𝗖𝗹𝗼𝘄𝗻𝘁𝗼𝗼𝗹𝘀_ 𝗼𝗻 _¶π$𝘁𝗮𝗴𝗿𝗮𝗺_who erased my doubt

  • @christyler7221
    @christyler7221 3 года назад

    I couldn't never had believe that I will still have access to my funds again if not for 𝑻𝒕𝒆𝒄 𝑜𝑛 𝑊𝒉𝑎𝑡𝑠𝐴𝑝𝑝 𝑐𝑜𝑛𝑡𝑎𝑐𝑡 𝒉𝑖𝑚 𝑣𝑖𝑎+1 (657) 443‑5112 _or 𝗖𝗹𝗼𝘄𝗻𝘁𝗼𝗼𝗹𝘀_ 𝗼𝗻 _¶π$𝘁𝗮𝗴𝗿𝗮𝗺_who erased my doubt

  • @madyaranurahlaida471
    @madyaranurahlaida471 3 года назад

    hiddentoolz on lg.. best ever on prvt keys, thanks to those who recommended them❤️🙌

  • @thethreehd6255
    @thethreehd6255 4 года назад

    *Professionalbitcoin7 on 1G remains the best on crypto currency’s problems*

  • @thethreehd6255
    @thethreehd6255 4 года назад

    *Professionalbitcoin7 on 1G remains the best on crypto currency’s problems*

  • @coltonwells4231
    @coltonwells4231 4 года назад

    Feeling good! Yeah that's me today. Tappan_nikto on Instagram just helped me got a private key for my ”non spendable” fund in my blockchain wallet.

  • @amlamarra
    @amlamarra 4 года назад

    Video titled "How We Discovered New Vulnerabilities in the ASUS RT-AC3200 Router." Presenter proceeds to say, "now in the interest of time, I'm not actually going to show you how I found both of these bugs." wtf

  • @conceptrat
    @conceptrat 4 года назад

    Could this not be just like the spam going in this comment stream now? Convince non tech people watching videos about how to get cryptocurrency or recover your lost keys. And bammm theft.

  • @cjhackerz
    @cjhackerz 4 года назад

    This is like true heaven for me

  • @shadowoflove942
    @shadowoflove942 4 года назад

    How you managed to run the webserver on the raspberry pi ?

  • @zelsu5646
    @zelsu5646 4 года назад

    Planning to buy. Thanks for the test! A small comment on the new update TOS 4.0 maybe?

  • @MarterElectronics
    @MarterElectronics 4 года назад

    That's amazing ^^ I was already prototyping some of my own furry badges. First idea was a NFC tag, RGB leds and a scrolling text screen on the bottom. The animation glasses is also an amazing idea which i would love to include ^^

  • @etimjohn7255
    @etimjohn7255 4 года назад

    He’s best at it, *cyberbeast10 on iG*

  • @undiemaryann2081
    @undiemaryann2081 4 года назад

    All Thanks to Raytools on >>¦¦nstaGram Unlocked my non-spendable btc back to spendable

  • @sarahclawson6770
    @sarahclawson6770 4 года назад

    ⚡⚡ *Boney2705 on !G* changed my life, I got 15BTC from him , forever grateful ☑️☑️☑️☑️

  • @dafoex
    @dafoex 5 лет назад

    "May have fleas" ...sigh... Interesting stuff so far

  • @OMGCARTOON
    @OMGCARTOON 5 лет назад

    The keyspace is 2^256, but the address space is 2^160 (an Ethereum address is obtained from the least significant 160-bit of the Keccak-256 hash). So theoretically a single address can have up to 2^96 private keys. And what could happen if we combine the birthday paradox with ethereum private key collisons? ;)

    • @peterwillemsen9516
      @peterwillemsen9516 5 лет назад

      Is this true? You could collide with an address but the blockchain still exposes the public keys given a signature and the message (transaction) it signed.

    • @sciencefic666
      @sciencefic666 4 месяца назад

      @@peterwillemsen9516 never

  • @goodmorningbitcoin5622
    @goodmorningbitcoin5622 5 лет назад

    Good job, I mentioned this in my latest video.

  • @ericnyamu9981
    @ericnyamu9981 5 лет назад

    what did lenovo say about these vulnerabilities?

  • @ISEsecurity
    @ISEsecurity 5 лет назад

    Read about these vulns on this blog here: blog.securityevaluators.com/new-vulnerabilities-found-in-lenovo-ix4-300d-28f545f5c86e

  • @AlienAndrew51
    @AlienAndrew51 5 лет назад

    Okay so how did you extract the source code from the router in the first place?

    • @ISEsecurity
      @ISEsecurity 5 лет назад

      You can email Asus and ask for it, and they should be legally obligated to provide it because it’s licensed under the GPL.

  • @jaredmeit6127
    @jaredmeit6127 5 лет назад

    Super clear explanations. Love this guy. Thanks so much to him and ISE!

  • @AlienAndrew51
    @AlienAndrew51 5 лет назад

    Probably the only channel with new real exploits.

  • @MyIronman8
    @MyIronman8 5 лет назад

    They made an firm ware for that router for this mouth Dec build .

  • @MyIronman8
    @MyIronman8 5 лет назад

    Can always have it open and you can add the MAC address to your computer to the router and just have the rider locked up and you wouldn't have access to it and then only that computer would go on to the router and then you couldn't have remote access anyways

  • @MyIronman8
    @MyIronman8 5 лет назад

    Turn the the PIN code off also change the wifi code password to an very long wifi code . lomger the better it is . Sucks tiping it in . You can copy and past it in from an usb stick .

  • @MyIronman8
    @MyIronman8 5 лет назад

    Okay they're pretty much saying that you can't do it over the Wi-Fi and you have to physically be at the device so you have put it in the closet or you put it somewhere where you can lock it up keep it away from people like you

  • @MyIronman8
    @MyIronman8 5 лет назад

    Huge question why did you not put the antennas on it

  • @maxdulin2353
    @maxdulin2353 5 лет назад

    Great job debugging! Thanks again for all the hardwork!

  • @antonioscognamiglio5470
    @antonioscognamiglio5470 5 лет назад

    Amazing demonstration, learned more in this video that in hours in book about pentesting, I would like to follow this guy, where can I find this people out

    • @ISEsecurity
      @ISEsecurity 5 лет назад

      Hope you were able to find us on twitter and on our blog. If not make sure to look at Rick's blogs here blog.securityevaluators.com and find Rick on twitter here twitter.com/rramgattie

  • @jaredmeit6127
    @jaredmeit6127 6 лет назад

    This series is fucking awesome. Thank you so much.

    • @rickramgattie5109
      @rickramgattie5109 5 лет назад

      We still got a couple more to go. I am glad to hear you are enjoying them!

  • @alfredo_i
    @alfredo_i 6 лет назад

    Am I the only one that saw the backdoor command?

    • @KucharJosef
      @KucharJosef 6 лет назад

      I was like: "Did i see backdoor somewhere?"