Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in Apple Podcasts
Paul's Security Weekly TV
2019
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Category: Enterprise Security Weekly
Sep 21, 2019

John Strand gives a teaser about his upcoming webcast: Attacking AWS: Elastic Map to Reduce Clusters. John will talk about the intro to cloud security research.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode154

Visit https://www.securityweekly.com/esw for all the latest episodes!

Sep 14, 2019

We interview Dan Cornell, the Founder & CTO the at DenimGroup.Next, Bryson Bort, the Founder & CEO at SCYTHE. Last, Yuriy Bulygin, the Founder & CEO at Eclypsium.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode153

Visit https://www.securityweekly.com/esw for all the latest episodes!

Sep 13, 2019

Steve Laubenstein is the VP - Cyber Threat Products Group at Core Security - a HelpSystems Company. Steve will be discussing the need to understand your system's resilience to attacks, and your people's ability to quickly identify and respond, has never been higher. Yet, we live in an IT world that is increasingly becoming borderless. We will be discussing the role of pen testing where mobile, cloud, IoT and network sprawl are the new normal.

To learn more about Core Security, visit: https://securityweekly.com/coresecurity

Full Show Notes: https://wiki.securityweekly.com/ES_Episode153

Visit https://www.securityweekly.com/esw for all the latest episodes!

Sep 12, 2019

This week, in the Enterprise News, Splunk buys SaaS startup Omnition, Stage Fund buys Israeli cybersecurity co Cymmetria, Trustwave platform brings more visibility and control cloud security, and more!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode153

Visit https://www.securityweekly.com/esw for all the latest episodes!

Sep 6, 2019

We interview Carolyn Crandall, the Chief Deception Officer at Attivo Networks. Carolyn will discussing the deception technology fabric, which interweaves "wolves in sheep's clothing" throughout the network to deceive attackers, detect their presence, and derail their attacks. We interview Krupa Srivatsan, the Director of Security Products at Infoblox. Krupa will talk about Network Security Foundations for Digital Transformation.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode152

Visit https://www.securityweekly.com/esw for all the latest episodes!

Sep 5, 2019

We interview Jason Brvenik, the Chief Executive Officer at NSS Labs. Jason will cover The Importance of Independent, Third-Party Testing. We interview Mehul Revankar, the Senior Product Manager at SaltStack. Mehul will be talking about the intersection between security and IT operations.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode152

Visit https://www.securityweekly.com/esw for all the latest episodes!

Sep 5, 2019

Privilege Escalation Vulnerability that existed in Check Point Software, Untangle survey finds SMBs continue to struggle with IT Security, Tufin delivers enhanced Visibility and Topology modeling for Cisco ACI Migration, and how the OS that poweredf smartphones started from failure!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode152

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 30, 2019

We interview Brett Wahlin, the VP of Security & Trust at Respond Software, Andrew Homer, the VP of Business Development at Morphisec, and Mat Gangwer, the Director of Managed Threat Response at Sophos.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode151

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 30, 2019

We interview Chris Kennedy, the CISO & VP and Customer Success at AttackIQ, Balaji Prasad, the VP of Product Management at BlueHexagon, and Mike Weber, the VP of Product Management at Coalfire.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode151

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 29, 2019

In the news, we discuss 5 tips on how testers can collaborate with software developers, Imperva discloses a data breach affecting some firewall users, VMware unveils security enhancements in Virtual Cloud Network Offering, and how Veristor and Synack partner to apply Ethical Hackers and AI Technology!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode151

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 24, 2019

In the news, ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode150

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 23, 2019

We interview Carsten Willems from VMRay and David Etue from BlueVoyant!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode150

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 22, 2019

We interview Steve Laubenstein from CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode150

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 16, 2019

We interviewed NetScout, Remediant, and BitDefender at Black Hat 2019!

 

Full Show Notes: https://wiki.securityweekly.com/ES_Episode149

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 16, 2019

Containers are a hot topic because of the simplicity they bring to the process of software development, shipping, and deployment. It is important to understand the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode148

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 16, 2019

Managing vulnerabilities the Enterprise is more than how many assets can you scan but how do you manage the issues that you discover. They will cover usability, easy to use tool, fast deployment, quickly operational, intuitive UI and workflow, discovery, and accuracy.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode148

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 16, 2019

Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode149

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 15, 2019

Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode148

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 15, 2019

IT operations and security teams are very different, but at a high level they both work to create a highly available digital infrastructure that s secure and compliant with regulatory standards. Achieving this goal is easier said than done for most organizations. SaltStack is bringing new solution to market to solve this well know but unique problem.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode149

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 2, 2019

Paul, Matt, and John Strand to discuss how Microsoft acquires BlueTalon to bolster data governance offerings, Arduino selects Auth0 as standardized login for open source ecosystem, new code-signing solution released by Venafi, and ExtraHop issues warning about phoning home in new security advisory!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode147

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 2, 2019

Charles Thompson, Sr. Director of Product Management at VIAVI Solutions, has a career spanning 20 years in the IT space specializing in using wire-data to assist SecOps and NetOps teams with management, analysis, and protection of critical applications, services, and data.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode147

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 1, 2019

To prepare for DEF CON and Black Hat, Paul and Matt talk about Evaluating Security Vendors!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode147

Visit https://www.securityweekly.com/esw for all the latest episodes!

Jul 20, 2019

Jared Haggerty is the Director, Content and Curation for Databerry. Jarred comes on the show to talk about an overview of security in business where it is now and where it is headed and the use of Automox in the IT Industry.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode145

Visit https://securityweekly.com/esw for all the latest episodes!

Jul 19, 2019

David Harding is the SVP & Chief Technology Officer at ImageWare Systems, Inc. Identity authentication is more important now than at any other time in history. Today's methods such as 2-factor authentication are falling short and are not as secure as once believed. How do we secure our networks, private information, financial transactions, and healthcare data without adding friction and losing privacy? We'll address the authentication methods that exist, when they are appropriate, and how to use both 2FA and multi-factor biometric authentication to control and manage your digital identity.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode145

Visit https://securityweekly.com/esw for all the latest episodes!

Jul 18, 2019

Vade Secure's Auto-Remediate adds automated protection for Office 365 environments, Aqua Security deepens strategic relationship with Microsoft to accelerate Azure deployments, Trend Micro's Deep Security as a Service now available on the Microsoft Azure Marketplace, DefenseStorm raises $15M to invest in employees and innovation, and much more!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode145

Visit https://securityweekly.com/esw for all the latest episodes!

1 2 3 4 5 6 7 Next » 9