We interview Steve Laubenstein from CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode150
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interviewed NetScout, Remediant, and BitDefender at Black Hat 2019!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!
Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!
Containers are a hot topic because of the simplicity they bring to the process of software development, shipping, and deployment. It is important to understand the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
Managing vulnerabilities the Enterprise is more than how many assets can you scan but how do you manage the issues that you discover. They will cover usability, easy to use tool, fast deployment, quickly operational, intuitive UI and workflow, discovery, and accuracy.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
IT operations and security teams are very different, but at a high level they both work to create a highly available digital infrastructure that s secure and compliant with regulatory standards. Achieving this goal is easier said than done for most organizations. SaltStack is bringing new solution to market to solve this well know but unique problem.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!
Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
Charles Thompson, Sr. Director of Product Management at VIAVI Solutions, has a career spanning 20 years in the IT space specializing in using wire-data to assist SecOps and NetOps teams with management, analysis, and protection of critical applications, services, and data.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode147
Visit https://www.securityweekly.com/esw for all the latest episodes!
Paul, Matt, and John Strand to discuss how Microsoft acquires BlueTalon to bolster data governance offerings, Arduino selects Auth0 as standardized login for open source ecosystem, new code-signing solution released by Venafi, and ExtraHop issues warning about phoning home in new security advisory!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode147
Visit https://www.securityweekly.com/esw for all the latest episodes!
To prepare for DEF CON and Black Hat, Paul and Matt talk about Evaluating Security Vendors!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode147
Visit https://www.securityweekly.com/esw for all the latest episodes!
Mike is the Director of Product Management for Google Cloud Security.The concept of shared responsibility between provider and customer is core to managing security and risk as organizations move to the cloud. With the rise of hybrid and multi-cloud deployments, how do responsibilities change? Segment will cover how you can evolve your risk models and how cloud providers might help maintain and improve your security posture in a hybrid world.
Full Show Notes: https://wiki.securityweekly.com/Episode613
Visit https://www.securityweekly.com/esw for all the latest episodes!
Riverbed launches Aternity to improve digital experiences, Synopsys and Ixia, a Keysight Business, Announce Collaboration to Enable Scalable Networking SoC Validation Solution, CyberArk unveils industrys most complete SaaS portfolio for privileged access security, The age of Azure is upon us: Microsoft's biggest business segment is now the one that includes its Azure cloud, OneLogin launches passwordless device authentication for Windows PCs without Active Directory, and much more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode146
Visit https://www.securityweekly.com/esw for all the latest episodes!
Luis is IT Glue s VP, Product. In his native Colombia, he was in the music business, once playing keyboards on tour with Shakira. Luis will be talking about Unified IT, and the Capabilities of Kaseya's IT Complete Platform What are organizations struggling with, and how the value of a unified platform can help drive higher efficiency, deeper workflow-level integrations, and lower overall cost.
To learn more about Kaseya, visit: https://securityweekly.com/kaseya Full Show Notes: https://wiki.securityweekly.com/ES_Episode146
Visit https://www.securityweekly.com/esw for all the latest episodes!
Jared Haggerty is the Director, Content and Curation for Databerry. Jarred comes on the show to talk about an overview of security in business where it is now and where it is headed and the use of Automox in the IT Industry.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode145
Visit https://securityweekly.com/esw for all the latest episodes!
David Harding is the SVP & Chief Technology Officer at ImageWare Systems, Inc. Identity authentication is more important now than at any other time in history. Today's methods such as 2-factor authentication are falling short and are not as secure as once believed. How do we secure our networks, private information, financial transactions, and healthcare data without adding friction and losing privacy? We'll address the authentication methods that exist, when they are appropriate, and how to use both 2FA and multi-factor biometric authentication to control and manage your digital identity.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode145
Visit https://securityweekly.com/esw for all the latest episodes!
Vade Secure's Auto-Remediate adds automated protection for Office 365 environments, Aqua Security deepens strategic relationship with Microsoft to accelerate Azure deployments, Trend Micro's Deep Security as a Service now available on the Microsoft Azure Marketplace, DefenseStorm raises $15M to invest in employees and innovation, and much more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode145
Visit https://securityweekly.com/esw for all the latest episodes!
Employees are the weakest link in Cybersecurity and because of this 80% of businesses will adopt a Cloud-based training solution by 2020. Small to Medium sized businesses are being left behind by complex, time-consuming solutions. Resellers need MRR, simple solutions that don't require training and certifications, and need help with client renewals. SMB's face the most complex, and highest rates of online attacks ever. Technology cannot solve all their risks, most solutions are too complex, time-consuming, and costly. Open solutions like CyberHoot allow you to build automated cybersecurity programs, track employee compliance, and address critical risks we all face.
Segment References: https://wiki.securityweekly.com/ES_Episode144 Visit https://securityweekly.com/esw for all the latest episodes!
In the news segment, Is Broadcom buying Symantec?, Chronicle will join Google Cloud, PingID to Support FIDO-Compliant Biometric Authentication and Security Keys, and BeyondTrust Simplifies Endpoint Privilege Management with PAM Platform Integration.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode144
Visit https://securityweekly.com/esw for all the latest episodes!
John Strand and Matt Alderman will discuss Threat Hunting.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode144
Visit https://securityweekly.com/esw for all the latest episodes!
In our final segment, we welcome Britta Glade, Director of Content and Curation of RSA Conference, and Linda Gray, Director and Chief of Operations for RSAC APJ, to discuss what's coming new this year for the RSA Conference APJ!
To learn more about RSAC APJ, visit: https://www.rsaconference.com/events/ap19
Full Show Notes: https://wiki.securityweekly.com/ES_Episode143
Visit https://securityweekly.com/esw for all the latest episodes!
In our second segment, we welcome Sai Chavali, Security Strategist at ObserveIT. Most companies have preventative controls on email today, however, they are still finding that users exfiltrating sensitive data through corporate email is all too common. Currently, detection and investigation of out-of-policy user activity and security incidents are time-consuming and riddled with manual processes. Learn more on how ObserveIT helps security teams with real-time detection and take investigation time from months to minutes.
To learn more about ObserveIT, visit: https://securityweekly.com/observeit
Full Show Notes: https://wiki.securityweekly.com/ES_Episode143
Visit https://securityweekly.com/esw for all the latest episodes!
CyberArk opens integration ecosystem to community contributions, ExtraHop Announces Reveal(x) Cloud, McAfee announced updates to McAfee MVISION Cloud for Amazon Web Services, and Elastic expands cybersecurity push in new version of software suite!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode143
Visit https://securityweekly.com/esw for all the latest episodes!
Paul will talk about the challenges of inheriting someone else's code. Paul will discuss 5 tips: Use an IDE, Variable Usage, Jump To Implementation and Declaration, Global Search, and Inspection.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode142
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly
→Like us on Facebook: https://www.facebook.com/secweekly
In the Enterprise News, Docker desktop for Windows 10 will soon switch to WSL 2, Netskope introduces Zero-Trust secure access to private enterprise applications, 10 notable security acquisitions of 2019, and can your patching strategy keep up with the demands of open source?
Full Show Notes: https://wiki.securityweekly.com/ES_Episode142
Visit https://securityweekly.com/esw for all the latest episodes!
Security in a healthcare environment takes on many unusual aspects that other industries do not typically deal with. From patient restraints to drug diversion to the highest workplace violence rates in any US industry, healthcare is one of the most complex and challenging security environments to maintain.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode142
Visit https://securityweekly.com/esw for all the latest episodes!