Recorded September 11, 2019 at G-Unit Studios in Rhode Island!
- Register for one of our upcoming webcasts with Bryce Shroeder and Barbara Kay of ServiceNow, Kevin O'Brien of GreatHorn, or Steve Laubenstein of Core Security (or all of them!) by going to securityweekly.com -> Click the webcast dropdown & Select Registration! If you have missed any of our previously recorded webcasts, you can find our on-demand library by selecting on-demand from the webcast drop down! If you attend any of our webcasts, you will receive 1 CPE credit per webcast!
- We're currently running our annual Listener Feedback Survey! Please visit securityweekly.com -> click the survey tab & select "2019 Listener Survey" to submit your responses!
- The new Security Weekly website is officially live! Visit securityweekly.com to check out all of our new sorting and filtering functionality! Please let us know if you find any issues or have any feedback by sending to email@example.com
- Paul will be providing his insights & predictions in the information & cyber security space at a local (ISC)2 RI Chapter Meeting on Monday, November 18th @ Gregg's Restaurant in Providence. If you would like to join us, go to securityweekly.com/isc2ri
- Splunk buys SaaS startup Omnition | ZDNet
- Stage Fund buys Israeli cybersecurity co Cymmetria
- Trustwave platform brings more visibility and control cloud security
- Shape Security Blog : The War No One is Talking About
- VMware buys Carbon Black and Pivotal, valued together at $4.8 billion
- Palo Alto Networks Announces Intent to Acquire Zingbox
- Vectra introduces a privilege-aware network detection and response solution
- Quest Announces Newest Release of the KACE SMA for Stronger Unified Endpoint Management and Security
- SyncDog partners with Symantec to address full spectrum of mobile security concerns - Help Net Security
- Awake Security enhances its platform with the ability to identify attackers based on their intent - Help Net Security
- Ping Identity launches initial public offering of its common stock - Help Net Security
- HackerOne Raises $36.4 Million in Series D Funding Round | SecurityWeek.Com
Interview: Steve Laubenstein, Core Security - a HelpSystems Company
Elements of an effective penetration testing program in an interconnected world
The need to understand your system's resilience to attacks, and your people's ability to quickly identify and respond, has never been higher. Yet, we live in an IT world that is increasingly becoming borderless. We will be discussing the role of pen testing where mobile, cloud, IoT and network sprawl are the new normal.
Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium
We interview Dan Cornell, the Founder & CTO the at DenimGroup.
Injecting the “Sec” into “DevSecOps” has always been a balancing act of getting the best reasonable coverage in the shortest reasonable length of time. Slowing down the DevOps process is a sure-fire way to get pulled out of the pipeline. Because of the current business culture, security teams are often forced to wait until the last minute to address any vulnerabilities within the developed code, leaving the organization vulnerable to security issues. These kinds of practices can leave companies and anyone within their ecosystem exposed to attacks which can cripple networks and cost millions in reparations. During this recording, Dan will speak directly to the difficulties organizations face in fitting security into the DevOps stack, how to change the current paradigm, and how organizations can streamline communication between Security and DevOps with the goal of earning itself a seat at the [board room] table.
We interview Bryson Bort, the Founder & CEO at SCYTHE.
Bryson covers some his research and talks in the IoT space.
We interview Yuriy Bulygin, the Founder & CEO at Eclypsium.
Yuriy will be giving 5 Tips for Protecting Firmware from Attacks. Firmware is the unguarded attack surface of the enterprise. Hackers attack firmware because they know many security and IT managers aren’t paying attention to it, and because firmware level attacks are persistent, stealthy, and able to bypass most security measures. The Meltdown and Spectre vulnerabilities introduced the world to the power of hardware-level weaknesses, LoJax malware brought UEFI rootkits into the wild, and BMC firmware vulnerabilities have impacted servers in the supply chain and the cloud. Laptops, servers and network devices are all at risk. Yuriy Bulygin, CEO of Eclypsium and founder of CHIPSEC, will discuss why firmware security is important, and steps that security teams can take to protect enterprise devices.