Difference between revisions of "ESWEpisode182"

From Security Weekly Wiki
Jump to navigationJump to search
(Added By Paul's Craptastic PPWorks Code)
(Added By Paul's Craptastic PPWorks Code)
 
(8 intermediate revisions by the same user not shown)
Line 10: Line 10:
 
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 
-->
 
-->
= 1. News - Enterprise News - 12:30 PM-01:00 PM  =
+
= 1. News - WordPress Attacks, IoT Device Shifts, & Splunk Cloud - 12:30 PM-01:00 PM  =
 
<!--   
 
<!--   
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
-->
 
-->
 +
 +
<center>{{#ev:youtube|hsvSYMbihcw }}</center>
  
  
Line 23: Line 25:
  
 
<li>Join the Security Weekly Mailing List by visiting securityweekly.com/subscribe and clicking the button to join the list! We will be starting to roll out our public Discord channel in the next week or so and our mailing list subscribers will get the first invites!</li>
 
<li>Join the Security Weekly Mailing List by visiting securityweekly.com/subscribe and clicking the button to join the list! We will be starting to roll out our public Discord channel in the next week or so and our mailing list subscribers will get the first invites!</li>
 +
 +
<li>Learn how penetration testing reduces risk in our next live webcast with Core Security (a Help Systems Company). Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. You can also access our on-demand library of previously recorded webcasts/trainings by visiting securityweekly.com/ondemand. </li>
  
 
</ul>
 
</ul>
Line 28: Line 32:
 
=== Description ===
 
=== Description ===
  
Description TBD
+
Microsoft is to buy Israeli cybersecurity startup CyberX, ExtraHop Data Shows Shifts in IoT Device Usage During COVID-19 Have Broad Security Implications, Immuta and Snowflake help customers share data with automated privacy protection, Code42 Integrates with Palo Alto Networks Cortex XSOAR to Speed and Automate Insider Threat Incident Response, and more!
  
  
Line 54: Line 58:
  
  
= 2. Technical Segment - Why the Cloud Stall is Now the Cloud Surge - 01:00 PM-01:30 PM  =
+
= 2. Technical Segment - Why the Cloud Stall Is Now the Cloud Surge - 01:00 PM-01:30 PM  =
 
<!--   
 
<!--   
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
-->
 
-->
  
 +
<center>{{#ev:youtube|jFmRvhFY92M }}</center>
 +
 +
 +
=== Sponsored By ===
 +
<gallery mode="packed" widths=150px heights=150px>
 +
Image:Extrahop_-_SecurityWeekly_-_01082020-6.png
 +
</gallery>
 +
<center><strong>Visit https://securityweekly.com/ for more information!</strong></center>
  
  
Line 71: Line 83:
  
 
Broad shifts to remote access plus increased strain on budgets and resources make it a business imperative to accelerate cloud adoption, and do it securely. Network detection and response bridges the gap between security and network teams and enables scalable visibility and security for cloud and multicloud environments.
 
Broad shifts to remote access plus increased strain on budgets and resources make it a business imperative to accelerate cloud adoption, and do it securely. Network detection and response bridges the gap between security and network teams and enables scalable visibility and security for cloud and multicloud environments.
 +
 +
To learn more about ExtraHop, visit: https://securityweekly.com/extrahop
  
  
Line 98: Line 112:
  
 
<gallery mode="nolines" widths=175px heights=175px>
 
<gallery mode="nolines" widths=175px heights=175px>
 
Image:John_Strand-0.jpg|<center>[https://twitter.com/@strandjs John Strand]  - Founder; Security Professional at Black Hills Information Security</center>
 
  
 
Image:MattAlderman-0.png|<center>[https://twitter.com/@maldermania Matt Alderman]  - CEO at Security Weekly</center>
 
Image:MattAlderman-0.png|<center>[https://twitter.com/@maldermania Matt Alderman]  - CEO at Security Weekly</center>
Line 112: Line 124:
 
-->
 
-->
  
 +
<center>{{#ev:youtube|OvVdzI60vXQ }}</center>
 +
 +
 +
=== Sponsored By ===
 +
<gallery mode="packed" widths=150px heights=150px>
 +
Image:For_Commercial_-_Rapid71920x1080-0.png
 +
</gallery>
 +
<center><strong>Visit https://securityweekly.com/rapid7 for more information!</strong></center>
  
  
Line 118: Line 138:
  
 
<li>Learn how penetration testing reduces risk in our next live webcast with Core Security (a Help Systems Company). Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. You can also access our on-demand library of previously recorded webcasts/trainings by visiting securityweekly.com/ondemand. </li>
 
<li>Learn how penetration testing reduces risk in our next live webcast with Core Security (a Help Systems Company). Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. You can also access our on-demand library of previously recorded webcasts/trainings by visiting securityweekly.com/ondemand. </li>
 +
 +
<li>Join us at InfoSecWorld 2020 - June 22nd-24th now a fully virtual event! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code!</li>
  
 
</ul>
 
</ul>
Line 124: Line 146:
  
 
Executing on a successful program and proving its efficacy is an impossibility for many security teams. Tune in as we discuss what steps you can take immediately to set more effective goals, track progress and share your success. You&#39;ll also have the opportunity to see how Rapid7&#39;s Vulnerability Management solution, InsightVM can help you create and contextualize metrics that your non-technical leadership and board—as well as your users—can understand.
 
Executing on a successful program and proving its efficacy is an impossibility for many security teams. Tune in as we discuss what steps you can take immediately to set more effective goals, track progress and share your success. You&#39;ll also have the opportunity to see how Rapid7&#39;s Vulnerability Management solution, InsightVM can help you create and contextualize metrics that your non-technical leadership and board—as well as your users—can understand.
 +
 +
To learn more about Rapid7, or to request a Demo, visit: https://securityweekly.com/rapid7
  
  
Line 143: Line 167:
  
 
<gallery mode="nolines" widths=175px heights=175px>
 
<gallery mode="nolines" widths=175px heights=175px>
 
Image:John_Strand-0.jpg|<center>[https://twitter.com/@strandjs John Strand]  - Founder; Security Professional at Black Hills Information Security</center>
 
  
 
Image:MattAlderman-0.png|<center>[https://twitter.com/@maldermania Matt Alderman]  - CEO at Security Weekly</center>
 
Image:MattAlderman-0.png|<center>[https://twitter.com/@maldermania Matt Alderman]  - CEO at Security Weekly</center>

Latest revision as of 01:58, 8 May 2020

Enterprise Security Weekly Episode #182 - May 06, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. News - WordPress Attacks, IoT Device Shifts, & Splunk Cloud - 12:30 PM-01:00 PM


Announcements

  • Join us at InfoSecWorld 2020 - June 22nd-24th now a fully virtual event! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code!
  • Join the Security Weekly Mailing List by visiting securityweekly.com/subscribe and clicking the button to join the list! We will be starting to roll out our public Discord channel in the next week or so and our mailing list subscribers will get the first invites!
  • Learn how penetration testing reduces risk in our next live webcast with Core Security (a Help Systems Company). Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. You can also access our on-demand library of previously recorded webcasts/trainings by visiting securityweekly.com/ondemand.

Description

Microsoft is to buy Israeli cybersecurity startup CyberX, ExtraHop Data Shows Shifts in IoT Device Usage During COVID-19 Have Broad Security Implications, Immuta and Snowflake help customers share data with automated privacy protection, Code42 Integrates with Palo Alto Networks Cortex XSOAR to Speed and Automate Insider Threat Incident Response, and more!


Hosts

John Strand's Content:

Articles

Matt Alderman's Content:

Articles

  1. Orchestra Group buys Israeli cybersecurity co Cronus
  2. Code42 Integrates with Palo Alto Networks Cortex XSOAR to Speed and Automate Insider Threat Incident Response
  3. Google Cloud partners with Splunk to form Splunk Cloud

Paul Asadoorian's Content:

  1. Cybersecurity Startup Orca Security Lands $20.5M Series A Funding - Security Boulevard
  2. Acronis Converges Data Protection, Cybersecurity for MSPs - ChannelE2E
  3. Microsoft to buy Israeli cybersecurity startup CyberX
  4. ExtraHop Data Shows Shifts in IoT Device Usage During COVID-19 Have Broad Security Implications
  5. Immuta and Snowflake help customers share data with automated privacy protection - Help Net Security
  6. CloudKnox enhances its platform to help orgs accelerate cloud adoption - Help Net Security
  7. Nearly a million WordPress sites targeted in extensive attacks - Help Net Security
  8. SaltStack Research Finds Automation and Alignment are Critical to SecOps Success


2. Technical Segment - Why the Cloud Stall Is Now the Cloud Surge - 01:00 PM-01:30 PM


Visit https://securityweekly.com/ for more information!


Announcements

  • We are looking for high-quality guest suggestions for all of our podcasts to fill our Q3 recording schedule! Submit your suggestions for guests by visiting securityweekly.com/guests and submitting the form! We review suggestions monthly and will reach out to you once reviewed!

Description

Broad shifts to remote access plus increased strain on budgets and resources make it a business imperative to accelerate cloud adoption, and do it securely. Network detection and response bridges the gap between security and network teams and enables scalable visibility and security for cloud and multicloud environments.

To learn more about ExtraHop, visit: https://securityweekly.com/extrahop



Presenter(s)

Matt Cauthorn

Matt Cauthorn is responsible for all security implementations and leads a team of technical security engineers who work directly with customers and prospects. A passionate technologist and evangelist, Matt is often on site with customers working to solve the complex and mission-critical business problems that Fortune 1,000 and global 2,000 companies face. After years spent helping customers tap into the value offered by network-based analytics, Matt has been able to bring fresh thinking to security threat detection. Prior to ExtraHop, Matt was a Sales Engineering Manager at F5 and before that he started his career in the trenches as a practitioner where he oversaw application hosting, infrastructure, and security for five international data centers.

Ted Driggs

Ted is a seasoned and customer-focused product manager with a background in enterprise IT, community-building, and cloud-native security.


Hosts

3. Technical Segment - Effective Goal Setting and Tracking - 01:30 PM-02:00 PM


Visit https://securityweekly.com/rapid7 for more information!


Announcements

  • Learn how penetration testing reduces risk in our next live webcast with Core Security (a Help Systems Company). Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. You can also access our on-demand library of previously recorded webcasts/trainings by visiting securityweekly.com/ondemand.
  • Join us at InfoSecWorld 2020 - June 22nd-24th now a fully virtual event! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code!

Description

Executing on a successful program and proving its efficacy is an impossibility for many security teams. Tune in as we discuss what steps you can take immediately to set more effective goals, track progress and share your success. You'll also have the opportunity to see how Rapid7's Vulnerability Management solution, InsightVM can help you create and contextualize metrics that your non-technical leadership and board—as well as your users—can understand.

To learn more about Rapid7, or to request a Demo, visit: https://securityweekly.com/rapid7



Presenter(s)

Justin Buchanan

As a Rapid7's offering manager, Justin is responsible for go-to-market strategy for Vulnerability Management and Offensive Security Solutions. He is driven by his background in IT and his deep understanding of customers' desired outcomes. Justin is passionate about how Rapid7 can help customers improve the maturity and effectiveness of their security programs.


Hosts