The Response Line – ESW #163
Full Audio
View Show IndexSegments
1. Cloudflare, Qulays, and Palo Alto – ESW #163
Cloudflare Open-Sources its Network Vulnerability Scanner, Qualys brings its Market Leading Vulnerability Management Solution to the next level, and some acquisition and funding updates from Palo Alto, Cymulate, Detectify, and Perimeter 81!
Host
2. Iot Crusher – Ken Belva – ESW #163
Kenneth F. Belva, CISSP, CEH is a cyber security expert practicing in the field since 1998 serving in both technical and non-technical roles. Ken joins Matt and Paul today to talk about Why scanning for default credentials missing from the rest of the scanning vendors! The problem of default and weak credentials. Why they're still low hanging fruit after all these years. And new solutions to detecting default and weak credentials on the network.
Guest
Kenneth F. Belva, CISSP, CEH is a cybersecurity expert practicing in the field since 1998 serving in both technical and non-technical roles. For the past 20+ years he worked mainly in the financial services vertical, most recently at a multinational conglomerate, conducting both technical and non-technical risk assessments at the application and network layers. From 2005 – 2013 he managed an Information Technology Risk Management Program for a bank whose assets are Billions of dollars. He has conducted technical assessments on large brand names, including Fortune 500 companies.
Host
3. Patch Management – Brendan O’Connor – ESW #163
From Fortune 500 to Education, from startup to running a consulting firm, Brendan's experience in information security has served him well. It all started with his boss speaking outloud about how they 'needed to get someone to handle security', and deciding he wanted to be that someone. Now a CISSP, CISM, and a couple of decades, and many industry changes, later he is still at it. Brendan joins Matt and Paul this week to discuss Patch Management, and how using Automox is helping him in the space!
Guest
From Fortune 500 to Education, from startup to running a consulting firm, Brendan’s experience in information security has served him well. It all started with his boss speaking out loud about how they ‘needed to get someone to handle security’, and deciding he wanted to be that someone. Now a CISSP, CISM, and a couple of decades, and many industry changes, later he is still at it.