We interview Azi Cohen the Co-founder of WhiteSource. He will be talking about Application security has undergone a transition in recent years, as information security teams testing products before release became irrelevant, developers started playing a leading role in the day-to-day operational responsibility for application security. We then interview Jeff Hudson the CEO of Venafi. He will talk about code signing that has been used to verify the integrity of software, and nearly every organization relies on it to confirm their code has not been corrupted with malware.
Full Show Notes: https://wiki.securityweekly.com/ASW_Episode74 Visit https://www.securityweekly.com/asw for all the latest episodes!
IT and data breaches are going up every year and a large portion of them involve vendors or other third parties with access to enterprise networks and systems. Mr. Howlett will review the current state, examine a couple of high profile vendor related breaches for lessons learned and talk about best practices to limit 3rd party risk.
Full Show Notes: https://wiki.securityweekly.com/BSWEpisode141 Visit https://www.securityweekly.com/bsw for all the latest episodes!
Pawan Shankar is the Senior Product Marketing Manager of Sysdig. Sysdig is very excited to announce the launch of Sysdig Secure 2.4! With this release, Sysdig adds runtime profiling to enhance anomaly detection and introduces brand new interfaces that improve runtime security policy creation and vulnerability reporting.
To learn more about Sysdig, visit: https://securityweekly.com/sysdig Full Show Notes: https://wiki.securityweekly.com/ASW_Episode74 Visit https://www.securityweekly.com/asw for all the latest episodes!
In the Leadership and Communications segment, The elements of a good company apology, 8 ways leaders delegate successfully, there's no shame in working on vacation and more!
Full Show Notes: https://wiki.securityweekly.com/BSWEpisode141 Visit https://www.securityweekly.com/bsw for all the latest episodes!
We interview Roman Sannikov, the Director and Analyst on Demand at Recorded Future. We also interview Ray DeMeo, the Chief Operating Officer at Virsec.
\Full Show Notes: https://wiki.securityweekly.com/Episode617
Visit https://www.securityweekly.com/psw for all the latest episodes!
In the news, ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode150
Visit https://www.securityweekly.com/esw for all the latest episodes!
Waiting to deploy critical patches makes you a bigger target - Cybercriminals Have Seven-Day Advantage to Weaponize Vulnerabilities, According to New Research from Tenable- Cyber Criminals have seven day advantage to weaponize vulnerabilities according to new research from tenable.
To learn more about Automox, visit: https://securityweekly.com/automox
Full Show Notes: https://wiki.securityweekly.com/Episode617
Visit https://www.securityweekly.com/psw for all the latest episodes!
Paul gives a technical segment on deobfuscating JavaScript to investigate phishing domains.
To learn more about DomainTools, visit: https://securityweekly.com/domaintools
Full Show Notes: https://wiki.securityweekly.com/Episode617
Visit https://www.securityweekly.com/psw for all the latest episodes!
We interview Carsten Willems from VMRay and David Etue from BlueVoyant!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode150
Visit https://www.securityweekly.com/esw for all the latest episodes!
We interview Steve Laubenstein from CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode150
Visit https://www.securityweekly.com/esw for all the latest episodes!
CVE-2019-1162 showcases elevation of privilege in an ancient Windows component. HTTP/2 Denial of Service Advisory with seven vulns that affects the protocol implemented by several vendors, SSH certificate authentication for GitHub Enterprise Cloud works well with tools like Sharkey and BLESS. We talked more about ephemeral access and SSH in episode 71, Polaris Points the Way to Kubernetes Best Practices, and much more!
Full Show Notes: https://wiki.securityweekly.com/ASW_Episode73 Visit https://www.securityweekly.com/asw for all the latest episodes!
Hacker Halted is EC-Council's premier IT Security Conference held in Atlanta annually. Hacker Halted gathers 1400+ Information Security Professionals in two days of Exhibiting, Breakout Sessions, Live Hacking Demos and Keynotes!
Full Show Notes: https://wiki.securityweekly.com/BSWEpisode140
To register for Hacker Halted, visit: https://securityweekly.com/hackerhalted and use the discount code HH19SW to get $100 off!
Visit https://www.securityweekly.com/bsw for all the latest episodes!
In the Leadership and Communications segment, 3 Traits Of Successful Entrepreneurs, 4 Ways To Gain Power And Use It For Good, 5 Reasons to Never Compromise on Punctuality, and more!
Full Show Notes: https://wiki.securityweekly.com/BSWEpisode140 Visit https://www.securityweekly.com/bsw for all the latest episodes!
At Black Hat 2019, we interviewed: Ameya Talwalker from Cequence, Mark Batchelor from PING Identity, and Michael Krueger from NowSecure!
Full Show Notes: https://wiki.securityweekly.com/ASW_Episode73 Visit https://www.securityweekly.com/asw for all the latest episodes!
In this segment, we interview O'Shea Bowens from Null Hat Security and Tyler Robinson from Nisos, Inc., from the Blue Team Village. Then we interview Aaran Leyland in the Social Engineering Village.
Full Show Notes: https://wiki.securityweekly.com/Episode616
Visit https://www.securityweekly.com/psw for all the latest episodes!
The Huawei shenanigans get deeper and more broad. - This is why I have issues with supply chain, CapitalOne hacker may have stolen from 30 more companies, New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records, Malware lingers in SMBs for an average of 800 days before discovery, and more!
Full Show Notes: https://wiki.securityweekly.com/Episode616
Visit https://www.securityweekly.com/psw for all the latest episodes!
Tony Punturiero is the Community Manager at Offensive Security. Discussing about my adventure transferring from being on the blue side to becoming a pentester/red teamer full time. Created an infosec community to help each people in the infosec field come together to learn from one another.
Full Show Notes: https://wiki.securityweekly.com/Episode616
Visit https://www.securityweekly.com/psw for all the latest episodes!
We interviewed NetScout, Remediant, and BitDefender at Black Hat 2019!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!
Containers are a hot topic because of the simplicity they bring to the process of software development, shipping, and deployment. It is important to understand the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
Managing vulnerabilities the Enterprise is more than how many assets can you scan but how do you manage the issues that you discover. They will cover usability, easy to use tool, fast deployment, quickly operational, intuitive UI and workflow, discovery, and accuracy.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!
In the Leadership and Communications segment, How our brains decide when to trust, Warren Buffet's "2 List strategy, Lack of IT leadership fuels IoT trial failures, and more!
Full Show Notes: https://wiki.securityweekly.com/BSWEpisode139 Visit https://www.securityweekly.com/bsw for all the latest episodes!
During this discussion, Joshua and Paul will speak about the threats facing organizations today and how they are evolving. Josh will also discuss how IT and security teams need to understand the threats their organizations face and how leveraging actionable threat intelligence can help them build the most effective and efficient defense strategy.
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly
→Like us on Facebook: https://www.facebook.com/secweekly
Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode148
Visit https://www.securityweekly.com/esw for all the latest episodes!
IT operations and security teams are very different, but at a high level they both work to create a highly available digital infrastructure that s secure and compliant with regulatory standards. Achieving this goal is easier said than done for most organizations. SaltStack is bringing new solution to market to solve this well know but unique problem.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode149
Visit https://www.securityweekly.com/esw for all the latest episodes!