Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Enterprise Security WeeklySubscribe
Asset Management, Container security, Cloud, Configuration management, Careers

ESW #197

September 2, 2020
Section 0

 

 

Proofpoint’s $300 Million buyback program, LogRhythmn Power Users share their use cases, Bitdefender Enhances MDR Service to Increase Proactive Protection and Advanced Detection, Anchore Unveils Enterprise 2.4 With Expanded & Updated Capabilities, and Auth0’s new bot detection! Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

Anchore Enterprise 2.4, Auth0 Bot Detection, & Bitdefender MDR

None

Hosts

John Strand

John Strand – Founder; Security Professional

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Announcements

  • BSides Boston is back in action for their 10 year anniversary! The conference will be held on Saturday, September 26th & tickets are only $10! You can get yours at https://bsidesbos.org! Some of the Security Weekly team will be in our own channel on the BSides Boston Discord server answering questions and possibly doing some contests!

  • Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting https://securityweekly.com/subscribe and clicking the button to join the list!

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

  • Security Weekly is ramping up our webcast/technical training schedule for the rest of 2020! In September you can Learn How to Extend the Enterprise Network for Remote Workers and Protect Your Home Network, Find out Why Traditional Data Security Can’t Be Zero Trust, and Learn how to reduce the blast radius of your cloud infrastructure. Visit https://securityweekly.com/webcasts to see what we have coming up! Or visit securityweekly.com/ondemand to view our previously recorded webcasts!

https://traffic.libsyn.com/sw-all/ESW_197_-_News-0_converted.mp3
Section 1

 

 

deepwatch Lens Score – The first SecOps maturity benchmarking and planning app. Answers CISO Questions: How mature is my Security Program? How do I compare to my peers? What one thing should I do next? This segment is sponsored by deepwatch. Visit https://www.deepwatch.com/lens-score/ to try deepwatch Lens Score for free!

Every organization gets compromised – it’s how you fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise IoT have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or incident from becoming a full-scale data breach. This segment is sponsored by ExtraHop Networks. Visit https://securityweekly.com/extrahop to learn more about them!

For a free trial of Reveal(x)360 visit: www.extrahop.com/swbh Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

SWVHSC Micro Interviews: deepwatch & ExtraHop

None

Hosts

Matt Alderman

Matt Alderman – CEO

Guests

Corey Bodzin

Corey Bodzin – CTO

Michael Sanders

Michael Sanders – Senior Engineer

https://traffic.libsyn.com/sw-all/ESW_197_-_deepwatch__ExtraHop-0_converted.mp3
Section 2

 

 

This year we’ve seen organizations accelerate their so-called digital transformation almost overnight. Now we’re getting to the point where security leaders and business owners need to stop and take stock of what happened, what’s a temporary band aid, and figure out how to build their strategy without the luxury of getting yelled at by vendor booths in Mandalay Bay. This segment is sponsored by CrowdStrike. Visit https://securityweekly.com/crowdstrike for a totally free trial!

CrowdStrike at Black Hat USA 2020 https://www.crowdstrike.blog/join-crowdstrike-at-black-hat-2020/

All applications use APIs—they’re nothing new to the development world. But are organizations factoring API security into their broader security strategy effectively? We’ve seen high-profile breaches at well-known companies stemming from their exposure or use of insecure API endpoints. This raises the question of how your software security initiative addresses the controls you need to ensure the APIs you use and produce are secure. Within this segment, Michael Borohovski will discuss key considerations when designing APIs, along with security controls and security testing that could make or break your software. This segment is sponsored by Synopsys.

Visit https://securityweekly.com/synopsys to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

SWVHSC Micro Interviews: CrowdStrike & Synopsys

None

Hosts

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Guests

Ian McShane

Ian McShane – VP, Product Marketing

Michael Borohovski

Michael Borohovski – Director of Software Engineering

https://traffic.libsyn.com/sw-all/ESW_197_-_CrowdStrike__Synopsys-0_converted.mp3

Related

Encryption
OpenSSL vulnerability can ‘definitely be weaponized,’ NSA cyber director says

Derek B. JohnsonMarch 21, 2022

The flaw affects OpenSSL versions 1.02, 1.1.1, and 3.0, all of which have been patched. OpenSSL is a core component of Unix and Linux-based systems, and is also bundled into software applications that run on Windows.

Encryption
Here’s why EMV alone isn’t enough to protect fuel pump transactions

Ruston Miles February 15, 2022

Gas stations and convenience stores must adopt a layered approach based on EMV chips and point-to-point encryption.

Encryption
NSA gains new cybersecurity authorities over national security systems

Derek B. JohnsonJanuary 19, 2022

The White House memo places the NSA in a role similar to the one the Cybersecurity and Infrastructure Security Agency (CISA) plays among federal civilian agencies.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.