
Real-world Ransomware Experience with Special Guest Gavin Ashton
This week, Adam and Andy speak with Stealthbits security strategist, Gavin Aston. Gavin wrote the blog "Maersk, me & notPetya" and brings a unique percepective to information security defense as someone who's survived a ransomware attack. Youtube Video Link Documentation: Maersk, me & notPetya Protecting Microsoft 365 from on-premises attacks Contact: Gavin Aston Twitter: @gvnshtn Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com ---------------------------------------------- Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Facebook: @bluesecpod
1 Feb 202140min

Application Security with Special Guest Tanya Janca
This week, Adam and Andy speak with application security guru, Tanya Janca, author of Alice and Bob learn Application Security. It was an amazing conversation where they touched on secure app design practices, password requirements, and infosec industry mentorship and education. Youtube Video Link Documentation: Alice and Bob learn Application Security We Hack Purple Academy We Hack Purple Youtube/Podcast Contact: Tanya Janca Twitter: @shehackspurple LinkedIn: tanya-janca Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com ---------------------------------------------- Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Facebook: @bluesecpod
25 Jan 202159min

Secure Messaging
This week, Adam and Andy go over some news about Microsoft Defender for Identity and Intel's new CPU ransomware protection. There was also some news about Whatsapp's new privacy policy. Adam and Andy dive into a comparison of the most popular secure messaging apps including an exploit that would affect all secure messengers. Documentation: Whatsapp's Updated Privacy Policy Signal Messenger Threem Messenger Secure Messaging Apps Comparison Contact: Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com
18 Jan 202137min

Solarwinds Revisited and Tech Policy under a Biden Administration
This week, Adam and Andy revisit some more guidance that has come out about Sunburst/Solarigate since the initial breach. Additionally, they share some thoughts about this week's insurrection at the US Capitol and the cybersecurity implications. Finally, with a Biden administration and a Democratic controlled government, Andy and Adam speculate on what might be taken up as priority when it comes to tech policy. Documentation: Microsoft Solarigate Resource Center Using Splunk to Detect Sunburst Backdoor Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers Using Microsoft 365 Defender to protect against Solorigate M365 advanced hunting queries Understanding "Solorigate"'s Identity IOCs - for Identity Vendors and their customers Protecting Microsoft 365 from on-premises attacks Contact: Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com
11 Jan 202135min

Information Security Tips & Tricks for Parents
Happy New Year! To ring in the new year, this week's episode focuses on parents who are working from home while having to help home school their kids as well. Adam and Andy go through a lot of tips and tricks that will help secure home networks, devices, and cloud accounts. Documentation: Setup OpenDNS Quad9 Disney Circle Eero Wifi How to change your wireless router's admin password 3-router method (Stacking routers for security) Ubiquiti Unifi Apple's Data Access when personal safety is at risk Microsoft Families Apple Families Google Families Contact: Twitter: @bluesecuritypod Instagram: @bluesecuritypodcast Andy Jaw Twitter: @ajawzero LinkedIn: andyjaw Email: andy@bluesecuritypod.com Adam Brewer Twitter: @ajbrewer LinkedIn: adambrewer Email: adam@bluesecuritypod.com
4 Jan 202131min

Merry Christmas! Learn how to spin up your own VM lab and dev environments
This holiday week, Adam and Andy give you some advice on how to spin up your own virtual machine lab and dev environment. They go through SaaS applications that have free dev environments as well as tools to use to manage VM's. They also give tips on what you can do with that lab environment from testing policies to managing devices in Intune and even learning about tools like Mimikatz and John the Ripper. Documentation: Lab Building Guide: Virtual Active Directory Script to spin up AD controllers quickly Microsoft Developer Subscription Android Images Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/
27 Des 202033min

Our thoughts on Fireeye, Solarwinds, and Sunburst
This week, Adam and Andy give you their thoughts on the Fireeye and Solarwinds breach. They also give defenders advice on immediate steps to help strengthen their organizations as well as some future insights on the direction security may be heading in terms on identity and device management. Finally, they give some thoughts on why it is important for security, business, and technical teams need to work as one cohesive unit in order to make security programs successful. Documentation: Unauthorized Access of FireEye Red Team Tools Check Point Response to FireEye Red Team Tools Leak CISA Updates Alert and Releases Supplemental Guidance on Emergency Directive for SolarWinds Orion Compromise Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor "The Chat" by Gavin Ashton Becoming resilient by understanding cybersecurity risks: Part 2 Detecting Abuse of Authentication Mechanisms by the NSA Protecting Microsoft 365 from on-premises attacks Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/
21 Des 202034min

Passwordless Authentication
Passwordless authentication is one of those rare features that strengthens security while making it easier for users to sign in. This week, Adam and Andy breakdown passwordless authentication options for enterprises in Windows, Azure AD, and other third party IDP's. They also address concerns about privacy when it comes to biometric data. Documentation: Windows Hello for Business Plan a passwordless authentication deployment in Azure Active Directory Passwordless authentication options for Azure Active Directory Factor Sequencing for Okta Andy Jaw Twitter: @ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Adam Brewer Twitter: @ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/
14 Des 202038min





















