Threat Intelligence, starting the Avalanche, Sealpath and Boldon James partner on document security classification and protection, and Oracle injects AI into its IoT cloud portfolio.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode60
Visit http://securityweekly.com/esw for all the latest episodes!
Matt and Michael discuss JASK, Automox, and more vendors that have stood out to them in the realms of security operations and endpoint protection!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!
Paul asked our Twitter followers about their favorite open-source alternatives to Nagios for monitoring system and service availability, and we listened, of course! Hear Paul’s essential enterprise network monitoring tools in this segment.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!
Matt and Michael discuss JASK, Automox, and more vendors that have stood out to them in the realms of security operations and endpoint protection!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!
Diving deep into threat intelligence, GeoGuard and Skyhook team up, securing mobile devices, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
John and Paul talk about low-hanging fruit, but try to determine if the enterprise is more secure because of your consulting on developer awareness. They help the enterprising company determine whether they need security training or not.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network and Threat Intelligence. Check out the discussion in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Security in the public cloud, the pitfalls of formal education, advanced security for AWS, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Mike Nichols, Director of Products at Endgame, joins us to discuss EDR, threat detection, and customer relations!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about Security Policies and Procedures. They discuss the most fundamental parts of policies and procedures. It is the most difficult to implement, but the most important to structure of the enterprise.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode56
Visit http://securityweekly.com/esw for all the latest episodes!
HashiCorp Vault brings disaster recover to security secrets management, Oracle joins SafeLogic to develop FIPS module for OpenSSL security, and Cylance bringing enterprise security platform technology to home users.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode56
Visit http://securityweekly.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Ping Look serves as the Executive Advisor of security communications and awareness at Optiv. Ping joins us to discuss security awareness, business diversity, and more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Building a SOC with limited resources, the top five barriers to implementation, Qualys is acquiring Nevis Networks, auditing your AWS security policies, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Where do the lines blur between monitoring, configuration, and vulnerability management? What is the best way to monitor systems in an enterprise? How to you manage machine to machine trust? Answers to all those questions and more in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode54
Visit http://securityweekly.com/esw for all the latest episodes!
Get some in-depth information on GDPR from Thomas Fischer, a Global Security Advocate at Digital Guardian and Director of BSides London!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode54
Visit http://securityweekly.com/esw for all the latest episodes!
Malwarebytes revamps their adware removal, Minerva Labs fights against ransomware, EdgeWave announces phishing detection and awareness, and more enterprise news!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode54
Visit http://securityweekly.com/esw for all the latest episodes!
Ferruh Mavituna of Netsparker joins us to discuss CI level automated web security!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode53
Visit http://securityweekly.com/esw for all the latest episodes!
Suffering breaches from ex-employees, Tanium announces threat response, the SANS Institute's incident response survey results, and is cybersecurity getting harder?
Full Show Notes: https://wiki.securityweekly.com/ES_Episode53
Visit http://securityweekly.com/esw for all the latest episodes!
If you are a security professional who has not taken the plunge into Docker, this segment is for you. Paul highlights some of the configuration options available for Docket containers and how you can apply them to both your operating system and application hardening strategies.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode53 (Including sample Docker files discussed in this segment)
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and Doug talk about the need for and the pitfalls of Egress Filtering in your enterprise network. And sweaty lawyers.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode52
Visit http://securityweekly.com/esw for all the latest episodes!
Fortinet preps for a next-gen firewall, Samsung no longer males printers, beware of Cisco training, using the right switches, Kubernetes, requirements and testing, to update or not to update and more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode52
Visit http://securityweekly.com/esw for all the latest episodes!
Apollo Clark discusses the tools and techniques your team can use to manage, monitor and tune your enterprise AWS deployment.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode51
Visit http://securityweekly.com/esw for all the latest episodes!
Love it or hate it, Docker (and containers) are here to stay. Embrace change in this segment where Paul and Apollo discuss using Docker in the enterprise. We cover security considerations, deployment scenarios and much more!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode51
Visit http://securityweekly.com/esw for all the latest episodes!