John Strand gives a teaser about his upcoming webcast: Attacking AWS: Elastic Map to Reduce Clusters. John will talk about the intro to cloud security research.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode154
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interview Dan Cornell, the Founder & CTO the at DenimGroup.Next, Bryson Bort, the Founder & CEO at SCYTHE. Last, Yuriy Bulygin, the Founder & CEO at Eclypsium.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode153
Visit https://www.securityweekly.com/esw for all the latest episodes!
Steve Laubenstein is the VP - Cyber Threat Products Group at Core Security - a HelpSystems Company. Steve will be discussing the need to understand your system's resilience to attacks, and your people's ability to quickly identify and respond, has never been higher. Yet, we live in an IT world that is increasingly becoming borderless. We will be discussing the role of pen testing where mobile, cloud, IoT and network sprawl are the new normal.
To learn more about Core Security, visit: https://securityweekly.com/coresecurity
Full Show Notes: https://wiki.securityweekly.com/ES_Episode153
Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, in the Enterprise News, Splunk buys SaaS startup Omnition, Stage Fund buys Israeli cybersecurity co Cymmetria, Trustwave platform brings more visibility and control cloud security, and more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode153
Visit https://www.securityweekly.com/esw for all the latest episodes!
Privilege Escalation Vulnerability that existed in Check Point Software, Untangle survey finds SMBs continue to struggle with IT Security, Tufin delivers enhanced Visibility and Topology modeling for Cisco ACI Migration, and how the OS that poweredf smartphones started from failure!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode152
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interview Carolyn Crandall, the Chief Deception Officer at Attivo Networks. Carolyn will discussing the deception technology fabric, which interweaves "wolves in sheep's clothing" throughout the network to deceive attackers, detect their presence, and derail their attacks. We interview Krupa Srivatsan, the Director of Security Products at Infoblox. Krupa will talk about Network Security Foundations for Digital Transformation.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode152
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interview Jason Brvenik, the Chief Executive Officer at NSS Labs. Jason will cover The Importance of Independent, Third-Party Testing. We interview Mehul Revankar, the Senior Product Manager at SaltStack. Mehul will be talking about the intersection between security and IT operations.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode152
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interview Brett Wahlin, the VP of Security & Trust at Respond Software, Andrew Homer, the VP of Business Development at Morphisec, and Mat Gangwer, the Director of Managed Threat Response at Sophos.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode151
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interview Chris Kennedy, the CISO & VP and Customer Success at AttackIQ, Balaji Prasad, the VP of Product Management at BlueHexagon, and Mike Weber, the VP of Product Management at Coalfire.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode151
Visit https://www.securityweekly.com/esw for all the latest episodes!
In the news, we discuss 5 tips on how testers can collaborate with software developers, Imperva discloses a data breach affecting some firewall users, VMware unveils security enhancements in Virtual Cloud Network Offering, and how Veristor and Synack partner to apply Ethical Hackers and AI Technology!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode151
Visit https://www.securityweekly.com/esw for all the latest episodes!
In the news, ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode150
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interview Carsten Willems from VMRay and David Etue from BlueVoyant!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode150
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interview Steve Laubenstein from CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode150
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interviewed NetScout, Remediant, and BitDefender at Black Hat 2019!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!
Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!
Containers are a hot topic because of the simplicity they bring to the process of software development, shipping, and deployment. It is important to understand the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
Managing vulnerabilities the Enterprise is more than how many assets can you scan but how do you manage the issues that you discover. They will cover usability, easy to use tool, fast deployment, quickly operational, intuitive UI and workflow, discovery, and accuracy.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
IT operations and security teams are very different, but at a high level they both work to create a highly available digital infrastructure that s secure and compliant with regulatory standards. Achieving this goal is easier said than done for most organizations. SaltStack is bringing new solution to market to solve this well know but unique problem.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!
Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
Charles Thompson, Sr. Director of Product Management at VIAVI Solutions, has a career spanning 20 years in the IT space specializing in using wire-data to assist SecOps and NetOps teams with management, analysis, and protection of critical applications, services, and data.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode147
Visit https://www.securityweekly.com/esw for all the latest episodes!
Paul, Matt, and John Strand to discuss how Microsoft acquires BlueTalon to bolster data governance offerings, Arduino selects Auth0 as standardized login for open source ecosystem, new code-signing solution released by Venafi, and ExtraHop issues warning about phoning home in new security advisory!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode147
Visit https://www.securityweekly.com/esw for all the latest episodes!
To prepare for DEF CON and Black Hat, Paul and Matt talk about Evaluating Security Vendors!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode147
Visit https://www.securityweekly.com/esw for all the latest episodes!
Jared Haggerty is the Director, Content and Curation for Databerry. Jarred comes on the show to talk about an overview of security in business where it is now and where it is headed and the use of Automox in the IT Industry.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode145
Visit https://securityweekly.com/esw for all the latest episodes!
David Harding is the SVP & Chief Technology Officer at ImageWare Systems, Inc. Identity authentication is more important now than at any other time in history. Today's methods such as 2-factor authentication are falling short and are not as secure as once believed. How do we secure our networks, private information, financial transactions, and healthcare data without adding friction and losing privacy? We'll address the authentication methods that exist, when they are appropriate, and how to use both 2FA and multi-factor biometric authentication to control and manage your digital identity.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode145
Visit https://securityweekly.com/esw for all the latest episodes!
Vade Secure's Auto-Remediate adds automated protection for Office 365 environments, Aqua Security deepens strategic relationship with Microsoft to accelerate Azure deployments, Trend Micro's Deep Security as a Service now available on the Microsoft Azure Marketplace, DefenseStorm raises $15M to invest in employees and innovation, and much more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode145
Visit https://securityweekly.com/esw for all the latest episodes!