From Paul's Security Weekly
Recorded May 8, 2019 at G-Unit Studios in Rhode Island!
- Register for our upcoming webcasts with ObserveIT & Kaseya by going to securityweekly.com/webcasts . If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand.
- Security Weekly is returning to Vegas this August for BlackHat and DefCon! If you would like to request a briefing or sponsor an interview on-site at BlackHat, please go to securityweekly.com/booking and submit your request!
- We've heard from our listeners that they love our content, but the amount of content we distribute can sometimes be overwhelming. We've recently released our customizable listener interest list. Visit https://securityweekly.com/subscribe and click the button to Join the Listener List and let us know your interests.
- Attending KubeCon and CloudNativeCon Europe 2019 in Barcelona May 20-23, 2019? Join your peers at the Cloud-Native Transformation Summit 2019 hosted by Sysdig on May 20th. Our very own Matt Alderman will be emceeing the event. Pre-registration is required. You can add it on during your KubeCon + CloudNativeCon registration.
Interview: Nik Whitfield, Panaseer
Topic: Continuous Controls Monitoring
- Secureworks launches new cybersecurity analytics app
- eSentire Launches Next-Generation Managed Vulnerability Service with Cyber Exposure Solutions from Tenable
- Newly minted unicorn Kaseya acquires cybersecurity startup ID Agent - SiliconANGLE
- BlackBerry Sees Cylance Sales Slow | Orange County Business Journal
- ExtraHop Joins Amazon Web Services Consulting Partner Private Offer Program to Deliver Enterprise Security in the Cloud
- Tenable Expands Partnership with ServiceNow - NCNONLINE
- Proofpoint to Acquire Meta Networks for $120 Million - TechBizWeb
- Shape Securitys latest product protects smaller businesses from credential stuffing TechCrunch
- StackRox Kubernetes Security Platform Receives Red Hat Container Certification
- Proofpoint to Acquire Meta Networks for $120 Million | SecurityWeek.Com
- SIEM Solutions Firm Exabeam Raises $75 Million | SecurityWeek.Com
- Privileged Access Management Solutions Are Shifting to the Cloud: Survey | SecurityWeek.Com
- Serverless monitoring startup Espagon expands to cover broader microservices TechCrunch
Security Industry Briefings Update
- 42Crunch - API security is a big deal. Why? Here is one reason: it is really easy to leave out security in order to get it working. The authentication part is a real pain. However, 42Crunch makes it easy. They integrate with the CI/CD pipeline and make it super easy for developers to write reliable and secure code for the API. They allow your QA teams to test against real-world security problems and make it easy to remediate. Their database of API issues is extensive. They also include the ability to audit and test APIs in production to make sure controls are in place, and if not temporarily protect your API from attacks! Great comprehensive security and controls for all of your APIs that will not require your devs to be security experts.
- Viridium - Aiming to get rid of the password. They use biometrics from your phone plus a unique key stored on your phone to complete the authentication. So, you have to have your phone and you have to pass some type of biometric. If you have a phone without biometrics they patented a way to take a picture of your fingers and do fingerprint comparison. All SAML based and pretty easy to integrate. They also have some motion-based detection, e.g. if someone takes your phone and holds it or moves it differently, it can require another factor of authentication.
- Whitecanyon - What do you do with your old computer equipment? Sure, there are ways to destroy it or wipe it, but how do you know it's been wiped? Whitecanyon provides great software to wipe all of your computers, drives, and devices. Then they provide a log of what has been wiped. Here's the thing: This is a cost saving. Rather than destroy equipment, now you can re-sell it or donate it and get a tax write-off. Storing it is expensive. Disposing of it is expensive. The cost of a breach is also expensive (e.g. a pawn shop got a hold of the Mayor's old laptop and discovered bad things).
- Eclypsium - How many enterprises listening can keep track of all the firmware systems on your Windows, Linux or OS X based systems? Firmware is not limited to just the UEFI or BIOS, but exists in your network cards, video cards, remote monitoring, etc... Most do not have visibility into these systems. Recent trends are showing that attackers are planting malware in these subsystems and using it for persistence. Eclypsium can put a temporary or perminant agent on your systems that will:
- Detect all of the firmware systems and their version
- Indicate which firmware needs to be updated
- Tell you which ones are vulnerable and to what
- Detect if there is malware already installed
Everyone needs this!}