This week, John Strand and Paul discuss some companies Paul got a chance to catch up with! They discuss GuardiCore and their Application Segmentation, Cyxtera and their Network Security and Software Defined Perimeters, PreVeilβs Encrypted Email and File Sharing, and more! In the Enterprise News this week, Avast launches AI-based software for phishing attacks, Carbon Black and Secureworks apply Red Cloak Analytics to Carbon Blacks Cloud, ShieldX integrates intention engine into Elastic Security Platform, and we have updates from Imperva, WhiteSource, BlackBerry, and more on this episode of Enterprise Security Weekly!
Β
Full Show Notes: https://wiki.securityweekly.com/ES_Episode111
Β
Visit https://www.securityweekly.com/esw for all the latest episodes!
Β
Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter!
Β
βFollow us on Twitter: https://www.twitter.com/securityweekly
βLike us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Mark Dufresne, VP of Threat Research at Endgame for an interview, to talk about how MITRE created their tool and what the MITRE attack framework is! In our second feature interview, we welcome John Walsh, DevOps Evangelist at CyberArk to talk about Kubernetes, DevSecOps, and how to strengthen your container authentication with CyberArk! In the security news, how to use the Shodan search engine to secure an enterprise's internet presence, Apache access vulnerability could affect thousands of applications, vulnerable controllers could allow attackers to manipulate marine diesel engines, & ICS Security Plagued with basic, and avoidable mistakes! All that and more, on this episode of Paul's Security Weekly!
Β
Full Show Notes: https://wiki.securityweekly.com/Episode579
Visit https://www.securityweekly.com/psw for all the latest episodes!
Sponsor Landing Page: www.endgame.com
Sponsor Landing Page: www.conjure.org/asw
Β
Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!
Follow us on Twitter: https://www.twitter.com/securityweekly
Like us on Facebook: https://www.facebook.com/secweekly
Β
This week, Michael and Paul interview Mike McKee, CEO of ObserveIT, and he joins us to talk about the importance of focussing on people, and you do that to experience growth! In the Article Discussion, Michael and Paul talk about the root cause of workplace drama, how to make the most of meetings between IT and your business partners, how to stop procrastinating on your goals by using the βSeinfeld Strategy", and more on this episode of Business Security Weekly!
Full Show Notes: https://wiki.securityweekly.com/BSWEpisode103
Β
Visit https://www.securityweekly.com/bsw for all the latest episodes!
Β
Visit https://www.activecountermeasures/bsw to sign up for a demo or buy our AI Hunter!!
Β
βVisit our website: https://www.securityweekly.com
βFollow us on Twitter: https://www.twitter.com/securityweekly
βLike us on Facebook: https://www.facebook.com/secweekly
This week, Critical Code execution flaws, WordPress working on wiping older versions from existence, Multiple serious flaws in Drupal, TCP/IP flaws leave IoT gear open to mass hijacking, jQuery plugin actively exploited for at least three years, Flaw in libssh leaves thousands of servers at risk of hijacking, and 8 adult websites exposes a bunch of "intimate" user data! Leonard Simon from Springboard joins us for expert commentary on how to get into the field of Information Security!
Β
Full Show Notes: https://wiki.securityweekly.com/HNNEpisode194
Visit https://www.securityweekly.com/hnn for all the latest episodes!
Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter!!
Β
Follow us on Twitter: https://www.twitter.com/securityweekly
Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul and April Wright discuss a jQuery Plugin that has been exploited for years is finally getting patched, a flaw in LibSSH leaves thousands of servers at risk, a remote code implantation flaw found in Medtronic Cardiac Programmers, hackers hiding Cryptocurrency malware in Adobe flash updates, how the government is finally rolling out 2 Factor Authentication for Federal Agency Domains, and how Disney is helping women from across their company to become Developers!
Β
Full Show Notes: https://wiki.securityweekly.com/ASW_Episode36
Visit https://www.securityweekly.com/asw for all the latest episodes!
Visit https://www.activecountermeasures/asw to sign up for a demo or buy our AI Hunter!
Β
Visit our website: https://www.securityweekly.com
Follow us on Twitter: https://www.twitter.com/securityweekly
Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul is joined by guest host Tyler Shields to interview Jonathan Sander, Security Field CTO of Snowflake computing! Jonathan explains how he came to work for Snowflake, what Snowflake does in the enterprise security space, and how Snowflake contains their data and protect from breaches as well as keeping the data safe! In the Enterprise Security News, Netscout takes internet scale Threat Protection to the Edge, Splunk addresses several vulnerabilities in Enterprise and Light products, Ping Identity launches a Quickstart Private Sandbox, and we have some acquisition updates from CheckPoint acquiring Dome9, CrowdStrike, Fortinet, Rapid7, and more!
Β
Full Show Notes: https://wiki.securityweekly.com/ES_Episode112
Visit https://www.securityweekly.com/esw for all the latest episodes!
Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter!
Β
βFollow us on Twitter: https://www.twitter.com/securityweekly
βLike us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Veronica Schmitt, Senior Digital Forensic Scientist for DFIRLABS! Veronica explains what SRUM is in Windows 10, and how SRUM can be a valuable tool in Digital Forensics! In the Technical Segment, we welcome Yossi Sassi, the Co-Founder and Cybersecurity Researcher at CyberArtSecurity.com and Advisory Board member at Javelin Networks! Yossi joins us to discuss using Windows Powershell, discussing DCSync, DCShadow, creative Event Log manipulation & thoughts about persistence! In the Security News, Fear of AI attacks, the FDA releases cybersecurity guidance, watch hackers steal a Tesla, serious D-Link router security flaw may never be patched, and California addresses default passwords! All that and more, on this episode of Paul's Security Weekly!
Β
Full Show Notes: https://wiki.securityweekly.com/Episode580
Visit https://www.securityweekly.com/psw for all the latest episodes!
To learn more about Javelin Networks, Go To: www.javelin-networks.com
Β
Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!!
Follow us on Twitter: https://www.twitter.com/securityweekly
ike us on Facebook: https://www.facebook.com/secweeklyΒ
This week, Michael and Paul discuss the tools that have helped them in their business. They talk about the books they've read, the interviews that helped them the most, and the journey from Startup Security Weekly to Business Security Weekly!
Β
Full Show Notes: https://wiki.securityweekly.com/BSWEpisode103
Visit https://www.securityweekly.com/bsw for all the latest episodes!
Visit https://www.activecountermeasures/bsw to sign up for a demo or buy our AI Hunter!!
Β
βVisit our website: https://www.securityweekly.com
βFollow us on Twitter: https://www.twitter.com/securityweekly
βLike us on Facebook: https://www.facebook.com/secweekly