Securing the cloud is all the rage these days. So many vendors are now offering services in this area, and rightfully so, as getting a handle on the security of SaaS applications is no small chore. When software isn't hosted in your environment, how do you secure it? Matt and Paul tackle this issue in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode65
Visit http://securityweekly.com/esw for all the latest episodes!
How do you control outbound egress filtering? What do you use NG firewalls for? Where do proxy servers fit into the mix? Paul and John discuss the ins and outs of network security architecture!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode63
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John discuss the Equifax breach and they make a lot of speculations about security risk and security leadership.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode62
Visit http://securityweekly.com/esw for all the latest episodes!
Don Pezet of ITProTV joins us to discuss network security architecture. How does it affect your enterprise? Secure networks closely depend on its performance, reliability, and security.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode60
Visit http://securityweekly.com/esw for all the latest episodes!
Matt and Michael discuss JASK, Automox, and more vendors that have stood out to them in the realms of security operations and endpoint protection!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!