John McAfee finally reveals his hack-proof system, ShieldX and Webroot join forces, a biometrics company teams up with Honeywell, and what percentage of successful attacks are caused by phishing?
Full Show Notes: https://wiki.securityweekly.com/ES_Episode64
Visit http://securityweekly.com/esw for all the latest episodes!
Google Cloud acquires Bitium, Ixia extends cloud visibility, Lacework announces Microsoft Windows Server support, Signal Sciences joins Splunk's Adaptive Response Initiative, and more enterprise security news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode63
Visit http://securityweekly.com/esw for all the latest episodes!
How do you control outbound egress filtering? What do you use NG firewalls for? Where do proxy servers fit into the mix? Paul and John discuss the ins and outs of network security architecture!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode63
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John discuss the Equifax breach and they make a lot of speculations about security risk and security leadership.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode62
Visit http://securityweekly.com/esw for all the latest episodes!
CyberGRX and BitSight join forces, Java vs. JavaScript, YARA rules explained, Riverbed teases an application networking offering, and more enterprise security news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode62
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and Matt discuss Bay Dynamics and VMware joining forces, the confessions of an insecure coder, Flexera acquiring BDNA, and more enterprise security news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode61
Visit http://securityweekly.com/esw for all the latest episodes!
Tom Parker is the Group Technology Officer of Accenture Security and a recognized thought leader in the security industry. He’s known for his research in adversary and threat profiling and software vulnerability.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode61
Visit http://securityweekly.com/esw for all the latest episodes!
Don Pezet of ITProTV joins us to discuss network security architecture. How does it affect your enterprise? Secure networks closely depend on its performance, reliability, and security.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode60
Visit http://securityweekly.com/esw for all the latest episodes!
Threat Intelligence, starting the Avalanche, Sealpath and Boldon James partner on document security classification and protection, and Oracle injects AI into its IoT cloud portfolio.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode60
Visit http://securityweekly.com/esw for all the latest episodes!
Matt and Michael discuss JASK, Automox, and more vendors that have stood out to them in the realms of security operations and endpoint protection!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!
Paul asked our Twitter followers about their favorite open-source alternatives to Nagios for monitoring system and service availability, and we listened, of course! Hear Paul’s essential enterprise network monitoring tools in this segment.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!
Matt and Michael discuss JASK, Automox, and more vendors that have stood out to them in the realms of security operations and endpoint protection!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!
Diving deep into threat intelligence, GeoGuard and Skyhook team up, securing mobile devices, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
John and Paul talk about low-hanging fruit, but try to determine if the enterprise is more secure because of your consulting on developer awareness. They help the enterprising company determine whether they need security training or not.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network and Threat Intelligence. Check out the discussion in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Security in the public cloud, the pitfalls of formal education, advanced security for AWS, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Mike Nichols, Director of Products at Endgame, joins us to discuss EDR, threat detection, and customer relations!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about Security Policies and Procedures. They discuss the most fundamental parts of policies and procedures. It is the most difficult to implement, but the most important to structure of the enterprise.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode56
Visit http://securityweekly.com/esw for all the latest episodes!
HashiCorp Vault brings disaster recover to security secrets management, Oracle joins SafeLogic to develop FIPS module for OpenSSL security, and Cylance bringing enterprise security platform technology to home users.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode56
Visit http://securityweekly.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Ping Look serves as the Executive Advisor of security communications and awareness at Optiv. Ping joins us to discuss security awareness, business diversity, and more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Building a SOC with limited resources, the top five barriers to implementation, Qualys is acquiring Nevis Networks, auditing your AWS security policies, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Where do the lines blur between monitoring, configuration, and vulnerability management? What is the best way to monitor systems in an enterprise? How to you manage machine to machine trust? Answers to all those questions and more in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode54
Visit http://securityweekly.com/esw for all the latest episodes!
Get some in-depth information on GDPR from Thomas Fischer, a Global Security Advocate at Digital Guardian and Director of BSides London!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode54
Visit http://securityweekly.com/esw for all the latest episodes!