Recorded September 11, 2019 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
- Splunk buys SaaS startup Omnition | ZDNet
- Stage Fund buys Israeli cybersecurity co Cymmetria
- Trustwave platform brings more visibility and control cloud security
- Shape Security Blog : The War No One is Talking About
- VMware buys Carbon Black and Pivotal, valued together at $4.8 billion
- Palo Alto Networks Announces Intent to Acquire Zingbox
- Vectra introduces a privilege-aware network detection and response solution
- Quest Announces Newest Release of the KACE SMA for Stronger Unified Endpoint Management and Security
- SyncDog partners with Symantec to address full spectrum of mobile security concerns - Help Net Security
- Awake Security enhances its platform with the ability to identify attackers based on their intent - Help Net Security
- Ping Identity launches initial public offering of its common stock - Help Net Security
- HackerOne Raises $36.4 Million in Series D Funding Round | SecurityWeek.Com
Interview: Steve Laubenstein, Core Security - a HelpSystems Company
Steve Laubenstein has been working for cyber security companies for the past 20 years, most recently as the GM for Core Security's Penetration Testing Solutions and now he heads up the Cyber Threat Business Unit at Core Security, a HelpSystems company.
Elements of an effective penetration testing program in an interconnected world
The need to understand your system's resilience to attacks, and your people's ability to quickly identify and respond, has never been higher. Yet, we live in an IT world that is increasingly becoming borderless. We will be discussing the role of pen testing where mobile, cloud, IoT and network sprawl are the new normal.
Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium
We interview Dan Cornell, the Founder & CTO the at DenimGroup.
Injecting the “Sec” into “DevSecOps” has always been a balancing act of getting the best reasonable coverage in the shortest reasonable length of time. Slowing down the DevOps process is a sure-fire way to get pulled out of the pipeline. Because of the current business culture, security teams are often forced to wait until the last minute to address any vulnerabilities within the developed code, leaving the organization vulnerable to security issues. These kinds of practices can leave companies and anyone within their ecosystem exposed to attacks which can cripple networks and cost millions in reparations. During this recording, Dan will speak directly to the difficulties organizations face in fitting security into the DevOps stack, how to change the current paradigm, and how organizations can streamline communication between Security and DevOps with the goal of earning itself a seat at the [board room] table.
We interview Bryson Bort, the Founder & CEO at SCYTHE.
Bryson covers some his research and talks in the IoT space.
We interview Yuriy Bulygin, the Founder & CEO at Eclypsium.
Yuriy will be giving 5 Tips for Protecting Firmware from Attacks. Firmware is the unguarded attack surface of the enterprise. Hackers attack firmware because they know many security and IT managers aren’t paying attention to it, and because firmware level attacks are persistent, stealthy, and able to bypass most security measures. The Meltdown and Spectre vulnerabilities introduced the world to the power of hardware-level weaknesses, LoJax malware brought UEFI rootkits into the wild, and BMC firmware vulnerabilities have impacted servers in the supply chain and the cloud. Laptops, servers and network devices are all at risk. Yuriy Bulygin, CEO of Eclypsium and founder of CHIPSEC, will discuss why firmware security is important, and steps that security teams can take to protect enterprise devices.