Difference between revisions of "ESWEpisode172"
From Paul's Security Weekly
|Line 16:||Line 16:|
Revision as of 21:16, 11 February 2020
Recorded February 12, 2020 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
- Insight Completes Venture Acquisition of Armis for $1.1 Billion
- Salt Security API Protection Explained | Salt Security
- RSA NetWitness Platform Bolsters Threat Detection and Incident Response
- Thycotic Leads the Way for Cloud-based Privileged Access Management
- Deep learning cybersecurity co Deep Instinct raises $43m
- LogicHub launches MDR+ to provide flexible end-to-end detection and response - Help Net Security
- CipherCloud CASB+ for Slack: Visibility, protection and control of all user activity on Slack - Help Net Security
- ZeroFOX launches AI-powered Advanced Email Protection for Google and Microsoft platforms - Help Net Security
- 12,000+ Jenkins servers can be exploited to launch, amplify DDoS attacks - Help Net Security
- Elastic Stack 7.6 delivers automated threat analysis and response - Help Net Security
- Tufin SecureCloud Enables Companies to Secure Hybrid Cloud Environments Without Compromising Business Speed or Agility
Interview: David Waugh, ManagedMethods
Cyber Safety & Security in K-12 Schools
As K-12 schools and students move into a digital world, the traditionally separate areas of campus safety and cybersecurity are converging. Cyberbullying, the increase in violence on campus, hackers targeting school information systems and student data, and the technological overlap between campus safety and cybersecurity are all driving this trend. The segment will look at how schools are taking a layered approach to protecting Google G Suite and Microsoft Office 365 data from risks focused on the K-12 education environment.
Interview: Jeff Deininger, ExtraHop
How to Secure Cloud Workloads & Reduce Friction with Cloud-Native Network Detection & Response
Migrating to the cloud is increasingly a business imperative, but there are pressing security challenges unique to cloud environments that can slow, halt, or even reverse progress. Here's how cloud-native network detection and response addresses those challenges, with a real-world example from Wizards of the Coast.
- www.extrahop.com/wizards - blog with AWS re:Invent session featuring Wizards of the Coast discussing their experience using ExtraHop Reveal(x) Cloud
- https://www.extrahop.com/resources/whitepapers/ndr-cloud-security-missing-link/ - educational ebook discussing and defining cloud-native NDR
- https://www.extrahop.com/lp/shared-responsibility/ - an interactive educational quiz detailing how the shared responsibility model breaks down across different cloud service models