Presentations
Defending from Crypto-Jacking, Ransomware and Worming Malware’s Frightening Future (Part of the BrightTalk webinar series )
Crypto-mining malware and crypto-jacking have taken center stage in cybercrime news. We’ll discuss the most recent events and see how this links to ransomware, which dominated the cybercrime news last year, where one outbreak cost seven companies over one billion...
Attack and Defense Episode 4: Breaking Into the Billu-Box Virtual Machine ( Part of the BeyondTrust webinar series)
Every organization hosts vulnerable web applications. Unfortunately, external attackers are often the first to reveal their exposures. There is hope, though: We can harden systems to stop application flaws from opening the door to all-out data breaches. In his...
Securing Applications with Linux Containers ( Part of the BeyondTrust webinar series )
Everywhere from DevOps to traditional system administrators, IT teams are looking to harness Docker and Kubernetes to reap the productivity and innovation potential of Linux containers. But, just as with the move from on-prem to cloud resources, providing security for...
Hacking and Defending a Linux-based Capture-the-Flag (Part of the BeyondTrust webinar series)
In this BeyondTrust webinar, InGuardians CTO and Bastille Linux creator, Jay Beale, will help you understand what you’re up against, and what it will take to secure your Linux environment from today’s threats. For this webinar, Jay will launch an attack on a...
Breaking the Zero-Day Attack on Linux (Part of the BeyondTrust webinar series)
It may seem like you can’t do anything to defeat the next “zero day” vulnerability in your Linux system, but that’s not true. Jay Beale, co-founder and CTO of InGuardians, leads a demo-heavy webinar – you’ll learn how to break a real world exploit with configuration,...
Breaches, Threats and How to Improve Security in 2018 (Part of the BrightTalk webinar series)
2017 is not yet over and it's already the year of cyber attacks. From phishing, to hacks, to classified hacking tools leaked and the biggest ransomware attacks to date (Wannacry, NotPetya), security professionals across the world are looking to apply the lessons...
How Do We Stop the Next Worm From Costing Billions?
Slides https://issa-ps.org/pastevents/october-membership-meeting/
Load Balancing IDS
By Brian Laing and Jimmy Alderson https://inguardians.box.com/shared/static/3swck8ula5mx5qosjwne1w3ptd4fq50j.pdf
Snort GUIs
Exploring the ins and outs of Snort front ends by Mike Poor https://inguardians.box.com/shared/static/hcx7dfnn87kckatukunngao107scyiz1.pdf
Complex Signatures
Correlating System and Application Logs with Traffic Traces and IDS Alerts by Mike Poor https://inguardians.box.com/shared/static/papgh6vwh0a4ee4o3snp2dnaz2ey4szq.pdf