Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Enterprise Security WeeklySubscribe
Asset Management, Container security, Cloud, Application isolation, Blue team

ESW #202

October 14, 2020
Section 0

 

 

Bad Neighbor Vulnerability, FireEye Announced ‘Mandiant Advantage: Threat Intelligence’ SaaS-based Offering, Aqua’s Trivy Now Available as a GitHub Action, Datadog adds Deployment Tracking to its APM to prevent outages related to bad code deploys, and Tenable and the Center for Internet Security Enter Partnership to Bolster Cyber Hygiene Across Public and Private Sectors! Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

Datadog Deployment Tracking, ‘Bad Neighbor’ Vulnerability, & Aqua’s Trivy

None

Hosts

John Strand

John Strand – Founder; Security Professional

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Announcements

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

  • It’s official! Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. The inaugural edition of Security Weekly Unlocked also celebrates Security Weekly’s 15th Anniversary. Registration and call for speakers is now open. Deadline for CFP is 10/15/20 so get your submissions in! Visit securityweekly.com/unlocked to submit your speaking session and register for free!

https://traffic.libsyn.com/sw-all/ESW_202_-_News-0_converted.mp3
Section 1

 

 

Sponsored By

 

sponsor
Visit https://securityweekly.com/rapid7 for more information!

 

Learn about some of the latest techniques attackers are using when phishing and vishing, including how to protect your users!

This segment is sponsored by Rapid7.

Visit https://securityweekly.com/rapid7 to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

Social Engineering Attacks Through Vishing & Phishing

https://www.rapid7.com/fundamentals/phishing-attacks/

https://blog.rapid7.com/2019/11/27/5-types-of-cybersecurity-attacks-to-watch-out-for-this-black-friday-and-cyber-monday/?cs=securityweekly

https://www.rapid7.com/research/under-the-hoodie/?cs=securityweekly

Hosts

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Guests

Whitney Maxwell

Whitney Maxwell – Security Consultant

Announcements

  • Would you like to have all of your favorite Security Weekly content at your fingertips? Do you want to hear from Sam & Andrea when we have upcoming webcasts & technical trainings? Have a question for one of our illustrious hosts, someone from the Security Weekly team, or wish you could “hang” out with the Security Weekly crew & community? Subscribe on your favorite podcast catcher, sign up for our mailing list, and join our Discord Server to stay in the loop on all things Security Weekly! Visit: https://securityweekly.com/subscribe

  • In our October 22nd technical training, we will provide a first look at a new, free resource that delivers thousands of remedies as a service to bridge the gap between vulnerabilities found, and vulnerabilities fixed! On October 28th, learn how to build an integrated security platform in our webcast at 3pm ET! Visit https://securityweekly.com/webcasts to see what we have coming up! Or visit securityweekly.com/ondemand to view our previously recorded webcasts!

https://traffic.libsyn.com/sw-all/ESW_202_-_Whitney_Maxwell_Rapid7-0_converted.mp3
Section 2

 

 

Simplifying The Process Of Identifying, Assessing & Mitigating Risks:
Liam Downward, CEO of CYRISMA, talks about burdensome technologies that generate bloat within any organization, high licensing costs along with the long deployment times. All of these affect the ROI on organizational resources Time, Money, and People.

This segment is sponsored by CYRISMA.

Visit https://securityweekly.com/cyrisma to learn more about them!

Get 10% off your monthly bill when you sign up! Visit: https://www.cyrisma.com

Summarizing the BlackHat Threat Intelligence Report:
Matthew Gardiner, Principal Security Strategist, from Mimecast will provide and overview of Mimecast and the results of their Threat Intelligence Report, BlackHat USA Edition, August 2020.

This segment is sponsored by Mimecast.

Visit https://securityweekly.com/mimecastbh to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

SWVHSC Micro Interviews: CYRISMA & Mimecast

None

Hosts

Matt Alderman

Matt Alderman – CEO

Guests

Liam Downward

Liam Downward – CEO

Matthew Gardiner

Matthew Gardiner – Principal Security Strategist

https://traffic.libsyn.com/sw-all/ESW_202_-_Liam_Downward__Matthew_Gardiner_Pre_Records-0_converted.mp3

Related

Remote access
Remote work complicates insider-threat challenge, says ex-Bank of America CIO

Karen HoffmanMay 25, 2022

Former Bank of America CIO David Reilly, who recently joined the boards of Safe Security and Ally Bank, says administrators, employees and third-party vendors add to the risk landscape.

Remote access
Zyxel patches RCE vulnerability in firewalls following report by Rapid7

Steve ZurierMay 13, 2022

Rapid7 researchers found the vulnerability allowing remote code execution by an attacked in a broad range of Zyxel firewalls.

Malware
Novel ‘Nerbian RAT’ uses OS-agnostic Go programming language to spread across platforms 

Steve ZurierMay 11, 2022

Proofpoint researchers say novel malware uses COVID-19 and World Health Organization themes to spread in Italy, Spain and the United Kingdom.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.