ESWEpisode160

From Paul's Security Weekly
Jump to: navigation, search

Recorded November 6, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Strand
    Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Annoucements:

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020 and click the register button to register with our discount code!
    • Attend RSA Conference 2020, February 24-28 and join thousands of security professionals, forward-thinking innovators and solution providers for five days of actionable learning, inspiring conversation and breakthrough ideas. Register before January 24 and save $900 on a Full Conference Pass. Save an extra $150 by going to securityweekly.com/rsac2020 and use our code to register!
    • Our next webcast is February 13th with Sri Sundaralingam, Vice President, Product and Solutions Marketing at ExtraHop where we will discuss Cloud Native Network Detection and Response! Register for our upcoming webcasts by visiting securityweekly.com, selecting the webcast drop down from the top menu bar and clicking registration.


    Enterprise News

    1. Tufin Provides End-to-End Automation for VMware NSX-T Data Center
    2. Trustwave offers threat detection and response capabilities for Microsoft Azure - Help Net Security
    3. Adaptiva launches Evolve VM, a life cycle vulnerability management product - Help Net Security
    4. SEC FORM D
    5. LogRhythm Offers Migration Service to Splunk Customers to Address Ongoing Security Challenges Without the Financial Burden
    6. CrowdStrikes Falcon security platform lands on AWS with new container features - SiliconANGLE
    7. Barracuda launches Cloud Application Protection to Secure Web Apps Enterprise IT World
    8. ServiceNow To Acquire Cognitive Search Capabilities of Attivio | FinSMEs
    9. GitLab plans to ban hires in China and Russia due to espionage concerns
    10. Sumo Logic Buys JASK Labs to Tackle SOC Challenges
    11. Employees know vulnerabilities exist, but they cant resolve them quickly enough - Help Net Security
    12. 50% of apps will not be migrated to the cloud - Help Net Security
    13. Sumo Logic Acquires JASK to Expand Cloud-Native Platform | SecurityWeek.Com
    14. Proofpoint Acquires ObserveIT to Bolster DLP Capabilities


    Interview: Adrian Sanabria, Thinkst

    Adrian Sanabriais the Advocate at Thinkst
    Adrian is an Advocate at Thinkst, the company behind the awesome and much loved Thinkst Canary. A former practitioner, PCI QSA, penetration tester, industry analyst and entrepreneur, he has explored many angles of the security industry, attempting to understand what makes it tick and what makes it fail. Adrian is an outspoken researcher that doesn't shy away from uncomfortable truths. He loves to write about the industry, tell stories and still sees the glass as half full.


    Interview: Tim Callan, Sectigo

    Tim Callan is the Senior Fellow at Sectigo
    Senior Fellow Tim Callan contributes to the company’s standards and practices effort, industry relations, product roadmap, and go-to-market strategy. Tim has more than twenty years’ experience as a strategic marketing and product leader for successful B2B software and SaaS companies, with fifteen years’ experience in the SSL and PKI technology spaces.

    Segment Topic:
    Quantum computing and what its arrival means for IT, traditional computing and infosecurity. TC expects that both architectures will live side by side, with traditional computing serving most tasks and quantum computing being employed for the specific operations where it offers improved efficiency. He will discuss expected outcome of quantum computing is that the world’s existing cryptographic infrastructure will have to change in a fundamental way and future encryption platforms need to be resistant to attacks not just from quantum computers but traditional computers as well.

    Segment Resources: