Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Business Security WeeklySubscribe
Asset Management, Cloud, Configuration management, Careers, Blue team

BSW #189

September 28, 2020
Section 0

 

 

Sponsored By

 

sponsor
Visit https://securityweekly.com/deepwatch for more information!

 

What makes MDR different from MSSP? What makes a good MDR provider? How do you decide to build your own capabilities, hire an MSSP or ally with an MDR?

This segment is sponsored by deepwatch.

Visit https://securityweekly.com/deepwatch to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes!

Full Episode Show Notes

State of the Managed Detection & Response Market

None

Hosts

Jason Albuquerque

Jason Albuquerque – CIO & CSO

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Guests

Ryan Benson

Ryan Benson – Director, Service Offerings

Announcements

  • Would you like to have all of your favorite Security Weekly content at your fingertips? Do you want to hear from Sam & Andrea when we have upcoming webcasts & technical trainings? Have a question for one of our illustrious hosts, someone from the Security Weekly team, or wish you could “hang” out with the Security Weekly crew & community? Subscribe on your favorite podcast catcher, sign up for our mailing list, or join our Discord Server to stay in the loop on all things Security Weekly! Visit: https://securityweekly.com/subscribe

  • It’s official! Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. The inaugural edition of Security Weekly Unlocked also celebrates Security Weekly’s 15th Anniversary. Registration will open soon, but call for speakers is now open. Visit securityweekly.com/unlocked to submit your speaking session.

https://traffic.libsyn.com/sw-all/BSW_189_-_Ryan_Benson_deepwatch-0_converted.mp3
Section 1

 

 

In the Leadership and Communications section, 6 types of CISO and the companies they thrive in, What are the habits of highly effective CISOs, Cybersecurity is Not a Four-Letter Word, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes!

Full Episode Show Notes

6 Types of CISO, Habits of Highly Effective CISOs, 10 Key Security Projects

None

Hosts

Jason Albuquerque

Jason Albuquerque – CIO & CSO

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Announcements

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

  • In our October 22nd technical training, we will provide a first look at a new, free resource that delivers thousands of remedies as a service to bridge the gap between vulnerabilities found, and vulnerabilities fixed! Visit https://securityweekly.com/webcasts to see what we have coming up! Or visit securityweekly.com/ondemand to view our previously recorded webcasts!

https://traffic.libsyn.com/sw-all/BSW_189_-_Leadership_Articles-0_converted.mp3

Related

Remote access
Zyxel patches RCE vulnerability in firewalls following report by Rapid7

Steve ZurierMay 13, 2022

Rapid7 researchers found the vulnerability allowing remote code execution by an attacked in a broad range of Zyxel firewalls.

Malware
Novel ‘Nerbian RAT’ uses OS-agnostic Go programming language to spread across platforms 

Steve ZurierMay 11, 2022

Proofpoint researchers say novel malware uses COVID-19 and World Health Organization themes to spread in Italy, Spain and the United Kingdom.

Remote access
Microsoft patches flaw in Azure Data Factory and Azure Synapse Pipelines

Steve ZurierMay 10, 2022

Security researchers advise teams to patch immediately because the flaw lets attackers execute remote commands across Azure integration runtimes.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.