Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Enterprise Security WeeklySubscribe
DevOps, Cloud, Endpoint Security, Endpoint Security

ESW #187

June 10, 2020
Section 0

Morpheus Announces Zero-Trust Cloud Management Platform, Thycotic Releases New Version of DevOps Secrets Vault, Qualys Remote Endpoint Protection gets malware detection, F-Secure launches ID PROTECTION, Vectra integrates network threat detection and response for Microsoft Security Services, and more!Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

F-Secure, Checkmarx SCA, & Sonatype Nexus

Hosts

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Announcements

  • Join us at InfoSecWorld 2020 – June 22nd-24th now a fully virtual event! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code!
  • Learn how hidden vulnerabilities lead to application compromise in our next webcast with Snyk! Our second June webcast will be with Google Cloud teaching you how to prevent account takeover attacks! Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. Or visit securityweekly.com/ondemand to view our previously recorded webcasts!
http://traffic.libsyn.com/sw-all/ESW_187_-_News-0_converted.mp3
Section 1

 

 

Sponsored By

 

 

sponsor
Visit http://nucleussec.com/ for more information!

 

In this episode of Enterprise Security Weekly, Nucleus co-founder Scott Kuffer talks about the problems teams face in doing the process of vulnerability management effectively and how Nucleus is uniquely positioned in the marketplace to solve them.

To learn more about Nucleus Security, visit: http://nucleussec.com Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

Vulnerability Management

SANS vulnerability management maturity model: https://www.sans.org/security-resources/posters/ciso-mind-map-vulnerability-management-maturity-model/205/download

Hosts

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Guests

Scott Kuffer

Scott Kuffer – Co-Founder & COO

Announcements

  • We are looking for high-quality guest suggestions for all of our podcasts to fill our Q3 recording schedule! Submit your suggestions for guests by visiting securityweekly.com/guests and submitting the form! We review suggestions monthly and will reach out to you once reviewed!
http://traffic.libsyn.com/sw-all/ESW_187_-_Scott_Kuffer_Nucleus-0_converted.mp3
Section 2

Heather will discuss a new book detailing best practices for designing scalable and reliable systems that are fundamentally secure.Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

Building Secure & Reliable Systems

https://cloud.google.com/blog/products/management-tools/learn-to-build-secure-and-reliable-systems-with-a-new-book-from-google

https://security.googleblog.com/2020/04/introducing-our-new-book-building.html

https://landing.google.com/sre/books/

Hosts

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Guests

Heather Adkins

Heather Adkins – Senior Director, Information Security and Privacy

Announcements

  • Join the Security Weekly Mailing List & receive your invite to our community Discord server by visiting securityweekly.com/subscribe and clicking the button to join the list!
http://traffic.libsyn.com/sw-all/ESW_187_-_Heather_Adkins_Google-0_converted.mp3

Related

DevOps
Investment round brings $27M for Tidelift

SC StaffMay 26, 2022

Tidelift has obtained a $27 million investment from a Series C funding round, which will be allocated toward strengthening the security of the open source supply chain.

DevOps
Why security teams need to automate DevSecOps for SAP

Christoph Nagy May 24, 2022

Companies should consider third-party tools that can scan for code defects in SAP business functions.

Zero trust
Few IT pros say they have ‘mastered’ security in cloud-native environments

Steve ZurierMay 20, 2022

Security researchers say managing hybrid- and multi-cloud environments has become more complex than ever – and that’s why so few are confident of security in the cloud.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.