POPULARITY
What does it really take to secure applications across a hybrid, multi-cloud environment? In this episode of Audience 1st, I sit down with Adolfo Lopez, Sales Engineer at AlgoSec, who brings a practitioner's lens to the cloud security conversation. From his experience as a network engineer to helping organizations operationalize cloud security today, Adolfo walks us through what most teams overlook—and how to get it right. We cover: Why visibility into application flows is foundational for multi-cloud security What enterprises miss when they treat the cloud like a lift-and-shift extension of on-prem Why security must be application-centric—not infrastructure-led The critical role of policy discovery, orchestration, and automation How AlgoSec ACE helps teams answer the question: “What will break if I make this change?” If your team is working across AWS, Azure, GCP, and on-prem—and struggling to manage risk, connectivity, and policy alignment, this episode breaks it down practically and tactically. To get a demo of AlgoSec, visit: https://www.algosec.com/lp/request-a-demo
Multi-cloud security isn't just a technology challenge—it's an organizational mindset problem. Security teams are juggling AWS, Azure, and GCP, each with different security models, policies, and rules. The result? Silos, misconfigurations, and security gaps big enough to drive an exploit through. In this episode, I sat down with Gal Yosef from AlgoSec to break down: Why multi-cloud security is so complex (and what security teams are getting wrong) How to bridge the gap between network security and cloud security teams How large enterprises manage cloud security policy enforcement across business units The shift from one-size-fits-all security policies to flexible, risk-based guardrails Why automation and visibility are critical for securing multi-cloud environments If you want to secure application connectivity across your hybrid environment, visit algosec.com.
Cloud security didn't make life easier—it made it exponentially harder. Security teams are stuck in legacy network security models while trying to secure cloud-native applications, security groups, IAM policies, and ephemeral workloads. The result? Confusion, misalignment, and a security posture that can't keep up with cloud speed. In this episode of Audience 1st Podcast, I chatted with Kyle Wickert from AlgoSec about: Why network security teams struggle with cloud security models The hidden complexity of securing applications across multi-cloud environments Why firewalls and network segmentation don't translate well to the cloud How security teams can gain visibility and control over cloud security policies The role of automation in bridging the gap between network security and cloud security If you're want to secure application connectivity across your hybrid environment, visit algosec.com.
In this episode of Audience 1st Podcast, Avishai Wool, CTO of AlgoSec and Joshua Copeland, Director of Managed Security Services at Quadrant Information Security and professor at Tulane University, join host, Dani Woolf, to discuss the complexities of cloud security and the challenges practitioners face when migrating to the cloud. They delve into the shift towards cloud-based infrastructure and the unique security human-centric, business, and technical considerations that come with it. Avishai and Josh highlight the significance of understanding the interconnected nature of cloud and on-premise environments and provide practical steps to approaching a comprehensive, double layered approach to cloud security. Key Takeaways: The shift to the cloud brings about challenges in understanding what needs to be protected and how to address security risks effectively. A successful cloud security strategy involves starting with visibility to identify misconfigurations and then focusing on network security to ensure connectivity between cloud and on-premise environments is secure. To achieve good cloud security, organizations must align their security measures with business requirements and identify key stakeholders to make informed decisions. The importance of having the right tooling in place for cloud security cannot be emphasized enough, as it helps in making informed decisions and managing thousands of security groups efficiently. Assessing a brownfield cloud environment involves onboarding all accounts into a Cloud Security Posture Management solution to identify critical findings and assess the need for public IP addresses. Understanding the nuances of cloud security requires a combination of knowledge, tools, and a thoughtful approach to addressing risks effectively in both greenfield and brownfield environments. Join Audience 1st Newsletter Today Join 1700+ cybersecurity marketers and sellers mastering security buyer research to better understand their audience and turn them into loyal customers: https://www.audience1st.fm/newsletter
Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to developers rather than contrived or overly simplistic examples. Segment resources: https://github.com/lirantal https://cheatsheetseries.owasp.org/cheatsheets/NPMSecurityCheat_Sheet.html https://lirantal.com/blog/poor-express-authentication-patterns-nodejs The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker's sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI impacts this perspective. Segment Resources: Vectra AI Platform Video: https://vimeo.com/916801622 Blog: https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained Blog: https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response MXDR Calculator: https://www.vectra.ai/calculators/mxdr-value-calculator This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them! In this interview, we will discuss the network security challenges of business applications and how they can also be the solution. AlgoSec has spent over two decades tackling tough security issues in some of the world's most complex networks. Now, they're applying their expertise to hybrid networks—where customers are combining their on-premise resources along with multiple cloud providers. Segment Resources: https://www.algosec.com/resources/ This segment is sponsored by AlgoSec. Visit https://securityweekly.com/algosecrsac to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-286
The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker's sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI impacts this perspective. Segment Resources: Vectra AI Platform Video: https://vimeo.com/916801622 Blog: https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained Blog: https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response MXDR Calculator: https://www.vectra.ai/calculators/mxdr-value-calculator This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them! In this interview, we will discuss the network security challenges of business applications and how they can also be the solution. AlgoSec has spent over two decades tackling tough security issues in some of the world's most complex networks. Now, they're applying their expertise to hybrid networks—where customers are combining their on-premise resources along with multiple cloud providers. Segment Resources: https://www.algosec.com/resources/ This segment is sponsored by AlgoSec. Visit https://securityweekly.com/algosecrsac to learn more about them! Show Notes: https://securityweekly.com/asw-286
Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to developers rather than contrived or overly simplistic examples. Segment resources: https://github.com/lirantal https://cheatsheetseries.owasp.org/cheatsheets/NPMSecurityCheat_Sheet.html https://lirantal.com/blog/poor-express-authentication-patterns-nodejs The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker's sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI impacts this perspective. Segment Resources: Vectra AI Platform Video: https://vimeo.com/916801622 Blog: https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained Blog: https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response MXDR Calculator: https://www.vectra.ai/calculators/mxdr-value-calculator This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them! In this interview, we will discuss the network security challenges of business applications and how they can also be the solution. AlgoSec has spent over two decades tackling tough security issues in some of the world's most complex networks. Now, they're applying their expertise to hybrid networks—where customers are combining their on-premise resources along with multiple cloud providers. Segment Resources: https://www.algosec.com/resources/ This segment is sponsored by AlgoSec. Visit https://securityweekly.com/algosecrsac to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-286
The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker's sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI impacts this perspective. Segment Resources: Vectra AI Platform Video: https://vimeo.com/916801622 Blog: https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained Blog: https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response MXDR Calculator: https://www.vectra.ai/calculators/mxdr-value-calculator This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them! In this interview, we will discuss the network security challenges of business applications and how they can also be the solution. AlgoSec has spent over two decades tackling tough security issues in some of the world's most complex networks. Now, they're applying their expertise to hybrid networks—where customers are combining their on-premise resources along with multiple cloud providers. Segment Resources: https://www.algosec.com/resources/ This segment is sponsored by AlgoSec. Visit https://securityweekly.com/algosecrsac to learn more about them! Show Notes: https://securityweekly.com/asw-286
How do we take control of truly dangerous drone situation? Jeffrey Starr is Chief Marketing Officer at D-Fend Solutions. D-Fend Solutions is the leading global provider of cyber-takeover, counter-drone solutions for sensitive and challenging environments. By focusing on the acute drone threat, their technology enables organizations around the world to maintain full control, safety, and continuity during rogue drone incidents across complex and sensitive environments and be prepared for future threats. The company's core offering, called EnforceAir, automatically executes radio frequency cyber-takeovers of rogue drones for safe landings and safe outcomes. Jeffery brings a track record of generating revenue and building market leadership through visionary business strategies. Prior to joining D-Fend Solutions, Jeffrey served as CMO and in executive roles at AlgoSec, Cellebrite, Verisk 3E, Magic Software Enterprises and Amdocs. Jeffrey also served as General Partner at Mission Ventures VC fund and as an Analyst at Booz Allen. In this edition of the Drone Radio Show, Jeffrey talks about D-Fend Solutions and ways the company is helping organizations throughout the world create safer skies by controlling dangerous drone situations.
DSO Overflow S3EP9Container SecuritywithRony MoshkovichIn this episode, Glenn and Jess are joined by Rony Moshkovich, co-founder & CPO at Prevasio, an AlgoSec company to talk about adopting a container security programme. Rony has extensive experience with cloud platform development, developing cloud-hosted service platforms for companies such as NTT, Symantec, HCL, CA, and more. A true veteran of the antivirus industry, Rony has worked as Development Director and Malware Research Lab Manager for CAHCL and PC ToolsSymantec. Having many years of extensive experience in building and managing security research labs, Rony is a recognised expert in Threat Management and Identity Access Management solutions for various markets.Resources mentioned in this podcast:Rony's LinkedIn profileCloud Native Computing Foundation (CNCF)Prevasio (and AlgoSec company)DSO Overflow is a DevSecOps London Gathering production. Find the audio version on all good podcast sources like Spotify, Apple Podcast and Buzzsprout.This podcast is brought to you by our sponsors: Prisma Cloud,, Apiiro, and SysdigYour HostsSteve Giguere linkedin.com/in/stevegiguereGlenn Wilson linkedin.com/in/glennwilsonJessica Cregg linkedin.com/in/jessicacreggDevSecOps - London GatheringKeep in touch with our events associated with this podcast via our website.For more about DevSecOps - London Gathering check out https://dsolg.com
This week we welcome Arik Kasha, VP EMEA of Seraphic Security to talk about his strategy and philosophy to successfully growing and scaling startups - and it's all about relationships. Arik Kasha is the VP Sales EMEA of Israeli cybersecurity vendor Seraphic Security. He is a graduate of The College of Management Academic Studies and began his sales career with Aladdin Knowledge Systems, now part of SafeNet, where he spent ten years. After running the EMEA sales team at AlgoSec, he joined ObserveIT who were acquired by ProofPoint for $225m (ProofPoint were then acquired by Toma Bravo for $12.3Bn) and after almost ten years with them joined Seraphic Security where he has responsibility for scaling the European revenues. LINKEDIN: https://www.linkedin.com/in/kasha Website: www.seraphicsecurity.com YOUR HOST Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and online coaching firm Salisi Academy. Since 1997, Simon has helped Senior Executives achieve Life Transformation by finding their ideal job and consulting with leading enterprise software and cybersecurity vendors to build highly effective teams. Get to know more about Simon at: Podcast: https://theconferenceroompodcast.com Website: https://simonlader.com/ Blog: blog.salisi.com Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader Spotify: https://open.spotify.com/show/3dd0obQSM8cYRV0HCxiuF0
Discussion with AlgoSec around ransomware based off of the Extrahop Cyber Confidence Index 2022. I cover numerous questions about what organizations are doing today and what they should change to improve cyber defenses. The crux of this study shows the cognitive dissonance of cyber security leaders and IT decision makers. They believe one thing whereas the evidence completely contradicts what they say.
Podcast sponsored by AlgoSec where I discuss how applications impact network and security engineers. This was a 1:1 conversation between me as an SME with a marketing leader at AlgoSec. You can find the full video interview here. This topic provides detail on challenges experienced by network and security engineers related to applications and application security. We talk about a business focus and the need for network and security engineers to know and focus on more than packets and protocols.For those interested in supporting Josh, my mentee looking to relocate to Canada and study cyber security, please visit GiveSendGo.
Brief introduction to Season 4 - July 2022-Sept 2022 and then the full session I presented at for the MSS Forum in Phoenix on May 12, 2022. The topic covers today's cyber security networking challenges. I offer recommendations for solutions and provide advice on where security professionals can focus. If you want a copy of the deck I used, send an email to cybergreybeard@gmail.com.Please donate to my Cyber Security mentee, Josh GbemisolaThe Cuckoo's EggThe Phoenix ProjectIBM Cost of a Data BreachMSS Forum PhoenixAlgoSec
How is it possible to stop a rogue drone when there are crowds of people nearby? Jeffrey Starr is Chief Marketing Officer at D-Fend Solutions. D-Fend Solutions is a technology company that supports the growth of safe and secure drone adoption with innovative solutions that defend against rogue drone threats. The company's EnforceAir system has protected some of the world's most important leaders, gatherings and organizations from the threat of rogue drones, including the G7 Summit and championship sporting events with tens of thousands of fans in attendance. This non-jamming, non-kinetic solution has been selected as a best-in-class radio frequency (RF), cyber-takeover system. In September 2021, a rogue drone appeared over a large public Mass led by Pope Francis in Slovakia. The threat was neutralized by EnforceAir without any disruption. Jeffry brings a track record of generating revenue and building market leadership through visionary business strategies. Prior to joining D-Fend Solutions, Jeffrey served as CMO and in executive roles at AlgoSec, Cellebrite, Verisk 3E, Magic Software Enterprises and Amdocs. Jeffrey also served as General Partner at Mission Ventures VC fund and as an Analyst at Booz Allen. In this edition of the Drone Radio Show, Jeffrey talks about D-Fend Solutions, the company's innovative EnforceAir drone detection and mitigation system and how it successfully and safely neutralized a drone threat to Pope Francis in 2021.
Hi techies, On today's episode, all the way from Boston, we're excited to host Nimrod (Nimmy) Reichenberg, the CMO of Siemplify and previously Algosec and Nextnine. We had a great conversation (in Hebrew) about the delicate relationship between marketing and sales and how to make it a true partnership. We talked about the pros/cons of various metrics marketing could be measured on in order to ensure a true alignment with sales and what other metrics can be used as leading indicators to ensure you're on track. Nimmy also shared some of his best-kept secrets on building a strong and healthy partnership between sales & marketing. Enjoy! Carmel & Asaph
After an early stint in the Air Force Reserves and then as an Algorithm Engineer, Guy's career then transformed after business school. He transitioned into Business Development, where he led the APAC expansion for Runcom Technologies and later Algosec. He was mentoring in an Australian cyber security accelerator, CyRise, when we was recruited by one of his mentees and now his Co-Founder. After a successful pivot, SecureStack is focusing on its product CloudBuilder, which enables secure templates for cloud deployments so the application attack surface can be rapidly reduced. SecureStack was recently named one of the top 20 cybersecurity firms to watch in 2021 by Forbes.
In the Enterprise News, the all new AWS Network Firewall, Zero Trust for kubernetes, interactive coding simulations, DNS monitoring, and Twitter appoints a new head of security! The latest acquisitions from Cisco, Acronis, Palo Alto Networks, and Flashpoint, and recent funding announcements from Unbound, Havoc Shield, Menlo Security and Cato networks! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw207
In the Enterprise News, the all new AWS Network Firewall, Zero Trust for kubernetes, interactive coding simulations, DNS monitoring, and Twitter appoints a new head of security! The latest acquisitions from Cisco, Acronis, Palo Alto Networks, and Flashpoint, and recent funding announcements from Unbound, Havoc Shield, Menlo Security and Cato networks! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw207
When it comes to orchestrating their cybersecurity, businesses cannot afford to take shortcuts. Rather, it's crucial that companies get their protection and defences right, or suffer consequences such as financial loss and reputational damage. In light of this, we're being joined by Professor Avishai Wool, CTO and Co-Founder of AlgoSec, to discuss the security challenges around the complexity of enterprise networks. In particular, Avishai outlines the issues organise face when orchestrating their security, as well as the common mistakes made. Furthermore, Avishai demonstrates how to turn security into a strategic business asset and the areas in which caution should be exercised.
New from BitDam, Ping, CrowsdStrike, Automox, Ixia, Recorded Future, CyberArk, AlgoSec, Tufin, Unisys. Redis servers found exposed to the Internet and vulnerable! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode178
New from BitDam, Ping, CrowdStrike, Automox, Ixia, Recorded Future, CyberArk, AlgoSec, Tufin, Unisys. Redis servers found exposed to the Internet and vulnerable! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode178
AlgoSec delivers Native Cloud Security Management for Azure, HP Reinvents customer experience with Ping Identity, what mid market security budgets will look like in 2019, and we have some acquisition & funding updates from ForeScout, Dragos, Netskope, Duality, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode115 Visit http://securityweekly.com/esw for all the latest episodes!
AlgoSec delivers Native Cloud Security Management for Azure, HP Reinvents customer experience with Ping Identity, what mid market security budgets will look like in 2019, and we have some acquisition & funding updates from ForeScout, Dragos, Netskope, Duality, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode115 Visit http://securityweekly.com/esw for all the latest episodes!
This week, Paul and Matt Alderman interview James Wickett, Head of Research at Signal Sciences! James talks about how security is moving to the application space and web applications! In the Enterprise News this week, AlgoSec delivers Native Cloud Security Management for Azure, HP Reinvents customer experience with Ping Identity, what mid market security budgets will look like in 2019, and we have some acquisition & funding updates from ForeScout, Dragos, Netskope, Duality, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode115 To learn more about Signal Sciences, go to: www.signalsciences.com/psw Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul and Matt Alderman interview James Wickett, Head of Research at Signal Sciences! James talks about how security is moving to the application space and web applications! In the Enterprise News this week, AlgoSec delivers Native Cloud Security Management for Azure, HP Reinvents customer experience with Ping Identity, what mid market security budgets will look like in 2019, and we have some acquisition & funding updates from ForeScout, Dragos, Netskope, Duality, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode115 To learn more about Signal Sciences, go to: www.signalsciences.com/psw Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, John Strand returns and runs the show solo, presenting his Technical Segment entitled "Building A Purple Team"! In the news, we have updates from Skybox, Wombat Security, McAfee, AlgoSec, and more, on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode92 Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, John Strand returns and runs the show solo, presenting his Technical Segment entitled "Build A Purple Team"! In the news, we have updates from Skybox, Wombat Security, McAfee, AlgoSec, and more, on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode92 Visit https://www.securityweekly.com/esw for all the latest episodes!
In the news, Duo Security launches media site, SolarWinds Democratizes Network Path Analysis with Release of Traceroute NG Free Tool, Martin Shkreli has to forfeit the Wu-Tang album because justice is sweet, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode82 Visit http://securityweekly.com/esw for all the latest episodes!
In the news, Duo Security launches media site, SolarWinds Democratizes Network Path Analysis with Release of Traceroute NG Free Tool, Martin Shkreli has to forfeit the Wu-Tang album because justice is sweet, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode82 Visit http://securityweekly.com/esw for all the latest episodes!
This week, Paul and John are accompanied by Eyal Neemany, Senior Cyber Security Researcher at Javelin Networks! In the news, we have updates from Duo Security, SolarWinds, AlgoSec, Martin Shkreli, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode82 Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, Paul and John are accompanied by Eyal Neemany, Senior Cyber Security Researcher at Javelin Networks! In the news, we have updates from Duo Security, SolarWinds, AlgoSec, Martin Shkreli, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode82 Visit https://www.securityweekly.com/esw for all the latest episodes!
In the news, privileged account management into the hybrid cloud, VIVOTEK and Trend Micro announce strategic partnership, Moneris partners with Kount to expand fraud protection services for Canadian online businesses, AlgoSec delivers complete end-to-end visibility and security management across the entire hybrid environment, and more enterprise security news! Full Show Notes: https://wiki.securityweekly.com/ES_Episode76 Visit http://securityweekly.com/esw for all the latest episodes!
In the news, privileged account management into the hybrid cloud, VIVOTEK and Trend Micro announce strategic partnership, Moneris partners with Kount to expand fraud protection services for Canadian online businesses, AlgoSec delivers complete end-to-end visibility and security management across the entire hybrid environment, and more enterprise security news! Full Show Notes: https://wiki.securityweekly.com/ES_Episode76 Visit http://securityweekly.com/esw for all the latest episodes!
This week, Michael Santarcangelo joins Paul to interview Clayton Fields, the Director of Javelin Networks joins us for an interview! In the news, we have updates from VIVOTEK, ServiceNow, Moneris, AlgoSec, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode76 Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, Michael Santarcangelo joins Paul to interview Clayton Fields, the Director of Javelin Networks joins us for an interview! In the news, we have updates from VIVOTEK, ServiceNow, Moneris, AlgoSec, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode76 Visit https://www.securityweekly.com/esw for all the latest episodes!