Podcasts about bay dynamics

  • 8PODCASTS
  • 17EPISODES
  • 30mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 3, 2018LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about bay dynamics

Latest podcast episodes about bay dynamics

The CyberWire
Iranian dissent takes to Tor. Iran cracks down on Internet services (and Infy gets busy). Kernel memory issue in Intel processors. macOS bug published. "Trackmageddon." Curating YouTube. Condolences to a SWATTING victim's family.

The CyberWire

Play Episode Listen Later Jan 3, 2018 17:57


In today's podcast we hear that Iran's crackdown on Internet channels of dissent continues. Intel processors are determined to have a deep security flaw: cloud users are likely to be affected. A macOS local privilege escalation vulnerability is published. The "Trackmageddon" location service vulnerability seems to originate in a buggy API. The suicide forest video appears to have passed through YouTube's human curators. The man arrested in the Wichita police shooting may have been a serial SWATTER. Joe Carrigan from JHU on holiday IoT devices. Guest is Thomas Jones from Bay Dynamics on updated NIST rules for DOD contractors. 

Paul's Security Weekly TV
Go Development Tools, ThreatQuotient, and Bay Dynamics - Enterprise Security Weekly #61

Paul's Security Weekly TV

Play Episode Listen Later Sep 16, 2017 28:18


Paul and Matt discuss Bay Dynamics and VMware joining forces, the confessions of an insecure coder, Flexera acquiring BDNA, and more enterprise security news! Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit http://securityweekly.com/esw for all the latest episodes!

news vmware development tools flexera threatquotient enterprise security weekly bdna bay dynamics es episode61 visit
Enterprise Security Weekly (Video)
Go Development Tools, ThreatQuotient, and Bay Dynamics - Enterprise Security Weekly #61

Enterprise Security Weekly (Video)

Play Episode Listen Later Sep 15, 2017 28:18


Paul and Matt discuss Bay Dynamics and VMware joining forces, the confessions of an insecure coder, Flexera acquiring BDNA, and more enterprise security news! Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit http://securityweekly.com/esw for all the latest episodes!

news vmware development tools flexera threatquotient enterprise security weekly bdna bay dynamics es episode61 visit
Enterprise Security Weekly (Audio)
Enterprise Security Weekly #61 - Crying Uncle

Enterprise Security Weekly (Audio)

Play Episode Listen Later Sep 14, 2017 63:57


Tom Parker of Accenture joins us. In the news, Bay Dynamics and VMware join forces, confessions of an insecure coder, Flexera acquires BDNA, and more on this episode of Enterprise Security Weekly!Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit https://www.securityweekly.com for all the latest episodes!

Paul's Security Weekly
Enterprise Security Weekly #61 - Crying Uncle

Paul's Security Weekly

Play Episode Listen Later Sep 14, 2017 63:57


Tom Parker of Accenture joins us. In the news, Bay Dynamics and VMware join forces, confessions of an insecure coder, Flexera acquires BDNA, and more on this episode of Enterprise Security Weekly!Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit https://www.securityweekly.com for all the latest episodes!

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
SC 123: Bay Dynamics CEO Discusses How to Gain Insight in to Security Risks Using User Behavior Analytics

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Play Episode Listen Later Aug 28, 2017 9:17


CISOs are increasingly looking to User Behavior Analytics (UBA) as a key security tool to help combat threats by identifying anomalous behavior. According to the report, CISOs Investigate: UBA, authored by more than a dozen CISOs, by quickly providing actionable intelligence, UBA enables them to potentially reduce loss to their organizations by identifying and thwarting attacks earlier. Feris Rifai, CEO of Bay Dynamics, a provider of analytics and UBA solutions, says CISOs are realizing that to effectively protect their organization they need to add a UBA component to their security arsenal. In this sponsored podcast, Rifai and David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discuss what UBA offers and how it is helping organizations across industries.

The CyberWire
Motives behind NotPetya, other operations. Verizon customer data exposed. Industry notes. Licensing hackers in Singapore.

The CyberWire

Play Episode Listen Later Jul 13, 2017 15:25


In today's podcast, we hear about signs that NotPetya was covering up a broad espionage campaign. State-sponsored hacking seems, when not simple spying, to aim at eroding trust. Verizon suffers a major customer data breach said to derive from a vendor's misconfiguration of an Amazon S3 bucket. Industry notes—venture funding and an acquisition. David Dufour from Webroot on homoglyph attacks. Thomas Jones from Bay Dynamics on federal agencies being required to submit a Framework Implementation Action Plan. Singapore will license white hats. And Russia wants you properly signed into adult sites. Or, at least, one of them, anyway.

Paul's Security Weekly TV
Steven Grossman, Bay Dynamics - Startup Security Weekly #38

Paul's Security Weekly TV

Play Episode Listen Later May 11, 2017 34:00


Steven has over 20 years of management consulting and industry experience working with technology, security and business executives. At Bay Dynamics, Steven is responsible for driving strategy and ensuring clients are successful in achieving security and risk management goals. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SSWEpisode38 Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Paul's Security Weekly
Startup Security Weekly #38 - We Need To Pivot!

Paul's Security Weekly

Play Episode Listen Later May 8, 2017 79:29


Steven Grossman of Bay Dynamics joins us. In the news, why your startup doesn’t necessarily need early stage funding, Cisco acquires Viptela, the risks of startup debt, and why do chefs and soldiers make the best product managers? Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SSWEpisode38 Visit http://www.securityweekly.com for all the latest episodes!

Business Security Weekly (Video)
Steven Grossman, Bay Dynamics - Startup Security Weekly #38

Business Security Weekly (Video)

Play Episode Listen Later May 8, 2017 34:00


Steven has over 20 years of management consulting and industry experience working with technology, security and business executives. At Bay Dynamics, Steven is responsible for driving strategy and ensuring clients are successful in achieving security and risk management goals. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SSWEpisode38 Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

Business Security Weekly (Audio)
Startup Security Weekly #38 - We Need To Pivot!

Business Security Weekly (Audio)

Play Episode Listen Later May 8, 2017 79:29


Steven Grossman of Bay Dynamics joins us. In the news, why your startup doesn’t necessarily need early stage funding, Cisco acquires Viptela, the risks of startup debt, and why do chefs and soldiers make the best product managers? Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SSWEpisode38 Visit http://www.securityweekly.com for all the latest episodes!

The CyberWire
Alleged BND surveillance of news organizations. Snake Wine in Japan, for disinformation? Singapore military phished. Google discloses more Microsoft unpatched bugs. Cloudbleed update. CloudPets may have privacy issues.

The CyberWire

Play Episode Listen Later Feb 28, 2017 14:03


In today's podcast, we learn that the BND may have been listening to the BBC, but not in a good way. Cylance reports on Snake Wine, a curiously familiar vintage sniffed in Japanese networks. Singapore's military sustains a phishing campaign without sustaining apparent damage. Google discloses more unpatched Microsoft vulnerabilities, these in IE and Edge browsers. Criminals claim to have exploited Cloudbleed, but the jury's still out. Joe Carrigan from the Johns Hopkins University's Information Security Institute helps us understand Cloudbleed. Steven Grossman from Bay Dynamics reviews New York State's newly enacted cyber regulations. And watch your language around those networked stuffed animals.

The CyberWire
Daily: An insider threat deadline approaches. Lawful intercept tools from Italy. Carbanak moves to new targets. Security policy in Germany and the US. A guilty plea in the TalkTalk hack.

The CyberWire

Play Episode Listen Later Nov 16, 2016 15:01


In today's podcast, we hear about some lawful intercept tools that have been found prospecting Android. Synack calls shenanigans on Shazam, but maybe no harm, no foul. Carbanak turns from banks to hospitality. Insider threats and how to mitigate them—if you've got a facility clearance, you've got a deadline coming up, and Steven Grossman from Bay Dynamics explains what it means. Arlington Capital merges three of its companies into a new cyber shop, Polaris Alpha. Symantec is rumored to be sniffing at LifeLock. Cyber policy discussions in Germany and the US sound a lot alike. Jonathan Katz from the University of Maryland explains the pros and cons of photonic encryption. A teenager cops to the TalkTalk hack, and, if you're asking for a friend, the tally of accounts affected by the AdultFriendFinder breach hits 412 million.

The CyberWire
Daily: Assange to DNC: buckle up. False flags and acts of war. Blockchain notes.

The CyberWire

Play Episode Listen Later Jun 20, 2016 13:58


In today's podcast we review the bidding over responsibility for the DNC hack—most observers still think signs point toward Moscow. Wikileaks promises more DNC documents to come. Suspicions revive that the Cyber Caliphate may be a false-flag operation and other notes on the difficulty of attribution. Dridex may be present in some SWIFT-related bank fraud. Angler seems gone for good (but replaced by other exploit kits). UK MPs suggest holding CEO's responsible for breaches by hitting their pay. Tanium and FireEye and their rejected suitors. DoJ responds to the Silk Road appeal. Jonathan Katz from the University of Maryland explains the Etherium/DAO cryptocurrency heist, and Ryan Stolte from Bay Dynamics share results from a report on board room engagement with cyber. 

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Some research suggests that 97 percent of organizations are already compromised, according to former Gartner analyst Eric Ouellet. And according to Ouellet the hackers are smarter and more persistent than ever, often having a better understanding of an organization's particular computing environment better than its owners. Recorded on the streets of San Francisco with Security Current's Vic Wheatman, Ouellet who is currently VP of Strategy for Bay Dynamics says that hackers will find a way to get inside an organization's network even if it takes a long time. There is only so much you can do to protect your environment, Ouellet adds and points to credit card companies use of anomalous behaviors as where the industry needs to head to mitigate attacks. 

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

The drumbeat of breaches -- Home Depot, Target, Jimmy John's and the list goes one -- continues almost daily. Why is this the case? It doesn't appear to be a lack of security investment or governance. As you'll hear from one former Gartner analyst who has 'gone over to the dark side,' a key problem is that individual security functions largely exist in isolated silos. Eric Ouellet, who is now VP of Strategy at Bay Dynamics, says this approach leads to data overload for security analysts causing fatigue and subsequently inadequate responses to attacks. Ouellet tells securitycurrent's Vic Wheatman that traditional approaches have flaws and generally lack the correlation of threat information from one silo to the rest, which would support holistic responses.

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Data Loss Prevention (DLP) solutions help keep private data private. Using various rules based on certain policies, sensitive information can be prevented from being exfiltrated. But CISOs are walking a fine line. They must be careful not to inhibit user and business processes lest there be dire business consequences. securitycurrent's Vic Wheatman speaks with ex-Gartner analyst Eric Ouellet, who is now Vice President of Strategy at Bay Dynamics, about how DLP actually works and where it can be used.