Matt and Michael discuss JASK, Automox, and more vendors that have stood out to them in the realms of security operations and endpoint protection!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!
Diving deep into threat intelligence, GeoGuard and Skyhook team up, securing mobile devices, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
John and Paul talk about low-hanging fruit, but try to determine if the enterprise is more secure because of your consulting on developer awareness. They help the enterprising company determine whether they need security training or not.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network and Threat Intelligence. Check out the discussion in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Security in the public cloud, the pitfalls of formal education, advanced security for AWS, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Mike Nichols, Director of Products at Endgame, joins us to discuss EDR, threat detection, and customer relations!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about Security Policies and Procedures. They discuss the most fundamental parts of policies and procedures. It is the most difficult to implement, but the most important to structure of the enterprise.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode56
Visit http://securityweekly.com/esw for all the latest episodes!
HashiCorp Vault brings disaster recover to security secrets management, Oracle joins SafeLogic to develop FIPS module for OpenSSL security, and Cylance bringing enterprise security platform technology to home users.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode56
Visit http://securityweekly.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Ping Look serves as the Executive Advisor of security communications and awareness at Optiv. Ping joins us to discuss security awareness, business diversity, and more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Building a SOC with limited resources, the top five barriers to implementation, Qualys is acquiring Nevis Networks, auditing your AWS security policies, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!