Cover image of SECTION 9 Cyber Security
(11)
Technology
Gadgets
Software How-To

SECTION 9 Cyber Security

Updated 11 days ago

Technology
Gadgets
Software How-To
Read more

Information Security is the name of the game. Don't let the hackers win!

Read more

Information Security is the name of the game. Don't let the hackers win!

iTunes Ratings

11 Ratings
Average Ratings
5
4
1
0
1

Cyber Security?

By Eyomudda - Aug 15 2018
Read more
I’ve listened to the last 3 episodes, fairly basic IT Podcast, didn’t make a connection with cyber security though. May be misnamed.

Perfect

By bsubronco - Sep 01 2017
Read more
Exactly what I've been looking for in a IT podcast. Something informative without the overarching condescension of most IT podcasts. Great at presenting valuable information from a beginners and experts perspective.

iTunes Ratings

11 Ratings
Average Ratings
5
4
1
0
1

Cyber Security?

By Eyomudda - Aug 15 2018
Read more
I’ve listened to the last 3 episodes, fairly basic IT Podcast, didn’t make a connection with cyber security though. May be misnamed.

Perfect

By bsubronco - Sep 01 2017
Read more
Exactly what I've been looking for in a IT podcast. Something informative without the overarching condescension of most IT podcasts. Great at presenting valuable information from a beginners and experts perspective.
Cover image of SECTION 9 Cyber Security

SECTION 9 Cyber Security

Updated 11 days ago

Read more

Information Security is the name of the game. Don't let the hackers win!

Rank #1: 122 - Installing & Using Nessus Essentials

Podcast cover
Read more

I finally downloaded, installed and tested Nessus Essentials. It worked out better than I expected. While it does have some limitations, it found Vulnerabilities on our servers. It’s another tool for the tool box. This version is free.

LINKS

Nessus Essentials - Info and download link

FIND US ON

1. Facebook

2. Twitter - DamienHull

Aug 05 2019
15 mins
Play

Rank #2: 123 - Using Our Simple Patch Management Process

Podcast cover
Read more

It’s official! We can say we’ve double checked our patch process. It’s quick and easy. We still have to double check our 3rd party apps. We’re hoping to start that process before the end of the month.

Remember, patching is one of the most important things you can do for your overall security. When wast the last time you double checked your patch process?

FIND US ON

1. Facebook

2. Twitter - DamienHull

Aug 12 2019
16 mins
Play

Rank #3: 98 - Wireshark Saves The Day

Podcast cover
Read more

We managed to take a couple of small steps in the right direction. I managed to document and clean up the network. Dorothy got my new workstation moved over to her desk.

We couldn’t have done it without Wireshark. It helped us track down an IP address for our Palo Alto Firewall.

While we did manage to get a few things done, we still have a lot of work to do.

Links

1. Share A Dell U3417W Monitor Between Two Computers - The instructions Dorothy used to setup her monitor

Feb 18 2019
22 mins
Play

Rank #4: 108 - A Security Program For Everyone

Podcast cover
Read more

As the title says, we’ve come up with a security program that works for everyone. For some, this is it. For others, this is a place to start.

We’re basing this on the first three CIS controls. We’re also using the new implementation groups in version 7.1. These implementation groups are awesome. Total game changer.

LINKS

1. CIS Introduces V7.1 of CIS Controls Featuring New Implementation Groups

Apr 29 2019
20 mins
Play

Rank #5: #75 IP Addressing & Network Design

Podcast cover
Read more

iTunes | Google | Stitcher

Dorothy and I talk about IP Addresses for her new network. There are several things we have to take into consideration. The number one issue is overlapping IP space. We can't have that. We also have to plan for the future. How many subnets will she need? Will the network grow in the future? What happens if we want to connect her network with another location? 

These are just some of things we have to take into consideration. Planning now will save us extra work in the future. 

Aug 13 2018
Play

Rank #6: #69 Setting Up A DHCP Server On Linux

Podcast cover
Read more

In this episode we talk about setting up a DHCP server on Linux. We go through the process of installing the software, configuring the service, and analyzing how DHCP works. We also talk about how some of this applies to security. We learned a lot from this project.

DHCPD.CONF FILE - IP addresses were changed for security reasons

# minimal sample /etc/dhcp/dhcpd.conf
default-lease-time 600;
max-lease-time 7200;

subnet 10.200.5.0 netmask 255.255.255.0 {
range 10.200.5.100 10.200.5.200;
option routers 10.200.5.1;
option domain-name-servers 10.250.1.2;
option domain-name "section9.lan";
}

THE LOG FILE - Example of the DHCP process

Jan 30 20:16:15 debian dhcpd[1397]: DHCPDISCOVER from 55:ee:76:51:89:ec via enp0s3
Jan 30 20:16:16 debian dhcpd[1397]: DHCPOFFER on 10.200.5.100 to 55:ee:76:51:89:ec (DESKTOP-O40EC06) via enp0s3
Jan 30 20:16:16 debian dhcpd[1397]: DHCPREQUEST for 10.200.5.100 (10.100.5.6) from 55:ee:76:51:89:ec (DESKTOP-O40EC06) via enp0s3
Jan 30 20:16:16 debian dhcpd[1397]: DHCPACK on 10.200.5.100 to 55:ee:76:51:89:ec (DESKTOP-O40EC06) via enp0s3
Jul 02 2018
Play

Rank #7: #77 LastPass, Yubikey, & Two Factor Authentication

Podcast cover
Read more

iTunes | Google | Stitcher | Spotify

We are slowly moving forward with LastPass, the Yubikey, and two factor authentication. Dorothy forgot her master password for LastPass. This lead us down the path of account recovery, which we quickly realized wasn't an option. What do we do if we forget our master password? What do we do if we lose our Yubikey? We're working on a plan. 

Aug 27 2018
Play

Rank #8: #74 Synology, Palo Alto, Yubikey, & Network Design

Podcast cover
Read more

We're getting ready to move our network to Dorothy's new computer room. This will be a lot of work. We talk about the equipment, some planning and things we need to work on.

LIST OF EQUIPMENT

1. Palo Alto PA-220 Firewall

2. 3 Cisco 8 port 3560 switch's 

3. Synology Disk Station - DS218+

4. Raspberry Pi Stack

5. Gigabyte server - Gigabyte Mini Intel Core i7-3537U 2GHz Compact PC Barebone (GB-XM1-3537)

Aug 06 2018
Play

Rank #9: #80 Adding Security to a Network

Podcast cover
Read more

iTunes | Google | Stitcher | Spotify

In this episode we talk about adding security to Dorothy’s network. We simplified the network design and incorporated what she already has. Security is always about layers. We’re planning to add segmentation with vlans, subnets, routing and an access control list. Other forms of security include 802.1x authentication for Wi-Fi and file permissions on the Synology DiskStation.

Dorothy’s Network

Sep 17 2018
Play

Rank #10: 119 - Our Patch Management Process

Podcast cover
Read more

We’ve got a patch management process. It isn’t perfect, but It’s a start. That’s way better than some organizations. What’s next? Testing it on Patch Tuesday.

FIND US ON

1. Facebook

2. Twitter - DamienHull

Jul 15 2019
20 mins
Play

Rank #11: 120 - How do we use LastPass in an enterprise environment?

Podcast cover
Read more

There’s only two of us here at Section 9. Deploying and using LastPass was relatively easy. What about using it in an enterprise environment with hundreds of workstations and laptops? That’s the real challenge. What features are we going to use? How do we deploy LastPass with Automox? Is SAML an option we want to use?

So many questions, so little time to figure them out.

LINKS

1. What is single sign-on (SSO)? - One should understand SSO before SAML.

2. What is SAML?

3. What is Okta?

FIND US ON

1. Facebook

2. Twitter - DamienHull

Jul 22 2019
22 mins
Play

Rank #12: #78 How secure is LastPass?

Podcast cover
Read more

In this episode we try to answer three questions. How secure is LastPass? How is information securely transferred between devices? How is information securely shared between users? We do our best to answer these questions.

LINKS

1. How is LastPass secure and how does it encrypt/decrypt my data safely?

2. CrackStation

Sep 03 2018
Play

Rank #13: 101 - The Risk Assessment Process

Podcast cover
Read more

We take a look at the risk assessment process. What is a risk assessment? How Does it reduce risk? We’re using a NIST risk assessment process. It can be long and complicated. We also do a quick risk assessment on two factor authentication. Once you understand risk assessments, they don’t have to be long and complicated.

Now that we know what some of our risks are, we can begin plugging the holes.

LINKS

1. NIST Small Business Information Security: The Fundamentals - This is the risk assessment process we’re using.

Mar 11 2019
29 mins
Play

Rank #14: 100 - What is Cyber Security?

Podcast cover
Read more

This is our 100th episode. Hard to believe we’ve made it this far. For this episode Dorothy and I want to answer what might seam to be a simple question. It isn’t. We also talk about the things we want to learn, future plans and how they relate to cyber security.

Mar 04 2019
33 mins
Play

Rank #15: 112 - The Verizon Data Breach Report

Podcast cover
Read more

I finally took a look at the Verizon Data Breach Report. If you haven’t read it, do it now. This report helps you understand how the hackers are getting in. You need to know how they get in if you want to plan for prevention and detection.

LINKS

1. The Verizon Data Breach Report

2. The Summary - The important parts of the Verizon Data Breach Report

May 27 2019
22 mins
Play

Similar Podcasts