Recorded September 11, 2019 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020 and click the register button to register with our discount code!
- Attend RSA Conference 2020, February 24-28 and join thousands of security professionals, forward-thinking innovators and solution providers for five days of actionable learning, inspiring conversation and breakthrough ideas. Register before January 24 and save $900 on a Full Conference Pass. Save an extra $150 by going to securityweekly.com/rsac2020 and use our code to register!
- Our next webcast is February 13th with Sri Sundaralingam, Vice President, Product and Solutions Marketing at ExtraHop where we will discuss Cloud Native Network Detection and Response! Register for our upcoming webcasts by visiting securityweekly.com, selecting the webcast drop down from the top menu bar and clicking registration.
- Splunk buys SaaS startup Omnition | ZDNet
- Stage Fund buys Israeli cybersecurity co Cymmetria
- Trustwave platform brings more visibility and control cloud security
- Shape Security Blog : The War No One is Talking About
- VMware buys Carbon Black and Pivotal, valued together at $4.8 billion
- Palo Alto Networks Announces Intent to Acquire Zingbox
- Vectra introduces a privilege-aware network detection and response solution
- Quest Announces Newest Release of the KACE SMA for Stronger Unified Endpoint Management and Security
- SyncDog partners with Symantec to address full spectrum of mobile security concerns - Help Net Security
- Awake Security enhances its platform with the ability to identify attackers based on their intent - Help Net Security
- Ping Identity launches initial public offering of its common stock - Help Net Security
- HackerOne Raises $36.4 Million in Series D Funding Round | SecurityWeek.Com
Interview: Steve Laubenstein, Core Security - a HelpSystems Company
Elements of an effective penetration testing program in an interconnected world
The need to understand your system's resilience to attacks, and your people's ability to quickly identify and respond, has never been higher. Yet, we live in an IT world that is increasingly becoming borderless. We will be discussing the role of pen testing where mobile, cloud, IoT and network sprawl are the new normal.
Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium
We interview Dan Cornell, the Founder & CTO the at DenimGroup.
Injecting the “Sec” into “DevSecOps” has always been a balancing act of getting the best reasonable coverage in the shortest reasonable length of time. Slowing down the DevOps process is a sure-fire way to get pulled out of the pipeline. Because of the current business culture, security teams are often forced to wait until the last minute to address any vulnerabilities within the developed code, leaving the organization vulnerable to security issues. These kinds of practices can leave companies and anyone within their ecosystem exposed to attacks which can cripple networks and cost millions in reparations. During this recording, Dan will speak directly to the difficulties organizations face in fitting security into the DevOps stack, how to change the current paradigm, and how organizations can streamline communication between Security and DevOps with the goal of earning itself a seat at the [board room] table.
We interview Bryson Bort, the Founder & CEO at SCYTHE.
Bryson covers some his research and talks in the IoT space.
We interview Yuriy Bulygin, the Founder & CEO at Eclypsium.
Yuriy will be giving 5 Tips for Protecting Firmware from Attacks. Firmware is the unguarded attack surface of the enterprise. Hackers attack firmware because they know many security and IT managers aren’t paying attention to it, and because firmware level attacks are persistent, stealthy, and able to bypass most security measures. The Meltdown and Spectre vulnerabilities introduced the world to the power of hardware-level weaknesses, LoJax malware brought UEFI rootkits into the wild, and BMC firmware vulnerabilities have impacted servers in the supply chain and the cloud. Laptops, servers and network devices are all at risk. Yuriy Bulygin, CEO of Eclypsium and founder of CHIPSEC, will discuss why firmware security is important, and steps that security teams can take to protect enterprise devices.