POPULARITY
In today's podcast we hear that Iran's crackdown on Internet channels of dissent continues. Intel processors are determined to have a deep security flaw: cloud users are likely to be affected. A macOS local privilege escalation vulnerability is published. The "Trackmageddon" location service vulnerability seems to originate in a buggy API. The suicide forest video appears to have passed through YouTube's human curators. The man arrested in the Wichita police shooting may have been a serial SWATTER. Joe Carrigan from JHU on holiday IoT devices. Guest is Thomas Jones from Bay Dynamics on updated NIST rules for DOD contractors.
Paul and Matt discuss Bay Dynamics and VMware joining forces, the confessions of an insecure coder, Flexera acquiring BDNA, and more enterprise security news! Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit http://securityweekly.com/esw for all the latest episodes!
Paul and Matt discuss Bay Dynamics and VMware joining forces, the confessions of an insecure coder, Flexera acquiring BDNA, and more enterprise security news! Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit http://securityweekly.com/esw for all the latest episodes!
Tom Parker of Accenture joins us. In the news, Bay Dynamics and VMware join forces, confessions of an insecure coder, Flexera acquires BDNA, and more on this episode of Enterprise Security Weekly!Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit https://www.securityweekly.com for all the latest episodes!
Tom Parker of Accenture joins us. In the news, Bay Dynamics and VMware join forces, confessions of an insecure coder, Flexera acquires BDNA, and more on this episode of Enterprise Security Weekly!Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit https://www.securityweekly.com for all the latest episodes!
Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
CISOs are increasingly looking to User Behavior Analytics (UBA) as a key security tool to help combat threats by identifying anomalous behavior. According to the report, CISOs Investigate: UBA, authored by more than a dozen CISOs, by quickly providing actionable intelligence, UBA enables them to potentially reduce loss to their organizations by identifying and thwarting attacks earlier. Feris Rifai, CEO of Bay Dynamics, a provider of analytics and UBA solutions, says CISOs are realizing that to effectively protect their organization they need to add a UBA component to their security arsenal. In this sponsored podcast, Rifai and David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discuss what UBA offers and how it is helping organizations across industries.
In today's podcast, we hear about signs that NotPetya was covering up a broad espionage campaign. State-sponsored hacking seems, when not simple spying, to aim at eroding trust. Verizon suffers a major customer data breach said to derive from a vendor's misconfiguration of an Amazon S3 bucket. Industry notes—venture funding and an acquisition. David Dufour from Webroot on homoglyph attacks. Thomas Jones from Bay Dynamics on federal agencies being required to submit a Framework Implementation Action Plan. Singapore will license white hats. And Russia wants you properly signed into adult sites. Or, at least, one of them, anyway.
Steven has over 20 years of management consulting and industry experience working with technology, security and business executives. At Bay Dynamics, Steven is responsible for driving strategy and ensuring clients are successful in achieving security and risk management goals. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SSWEpisode38 Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Steven Grossman of Bay Dynamics joins us. In the news, why your startup doesn’t necessarily need early stage funding, Cisco acquires Viptela, the risks of startup debt, and why do chefs and soldiers make the best product managers? Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SSWEpisode38 Visit http://www.securityweekly.com for all the latest episodes!
Steven has over 20 years of management consulting and industry experience working with technology, security and business executives. At Bay Dynamics, Steven is responsible for driving strategy and ensuring clients are successful in achieving security and risk management goals. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SSWEpisode38 Visit http://securityweekly.com/category/ssw/ for all the latest episodes!
Steven Grossman of Bay Dynamics joins us. In the news, why your startup doesn’t necessarily need early stage funding, Cisco acquires Viptela, the risks of startup debt, and why do chefs and soldiers make the best product managers? Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SSWEpisode38 Visit http://www.securityweekly.com for all the latest episodes!
In today's podcast, we learn that the BND may have been listening to the BBC, but not in a good way. Cylance reports on Snake Wine, a curiously familiar vintage sniffed in Japanese networks. Singapore's military sustains a phishing campaign without sustaining apparent damage. Google discloses more unpatched Microsoft vulnerabilities, these in IE and Edge browsers. Criminals claim to have exploited Cloudbleed, but the jury's still out. Joe Carrigan from the Johns Hopkins University's Information Security Institute helps us understand Cloudbleed. Steven Grossman from Bay Dynamics reviews New York State's newly enacted cyber regulations. And watch your language around those networked stuffed animals.
In today's podcast, we hear about some lawful intercept tools that have been found prospecting Android. Synack calls shenanigans on Shazam, but maybe no harm, no foul. Carbanak turns from banks to hospitality. Insider threats and how to mitigate them—if you've got a facility clearance, you've got a deadline coming up, and Steven Grossman from Bay Dynamics explains what it means. Arlington Capital merges three of its companies into a new cyber shop, Polaris Alpha. Symantec is rumored to be sniffing at LifeLock. Cyber policy discussions in Germany and the US sound a lot alike. Jonathan Katz from the University of Maryland explains the pros and cons of photonic encryption. A teenager cops to the TalkTalk hack, and, if you're asking for a friend, the tally of accounts affected by the AdultFriendFinder breach hits 412 million.
In today's podcast we review the bidding over responsibility for the DNC hack—most observers still think signs point toward Moscow. Wikileaks promises more DNC documents to come. Suspicions revive that the Cyber Caliphate may be a false-flag operation and other notes on the difficulty of attribution. Dridex may be present in some SWIFT-related bank fraud. Angler seems gone for good (but replaced by other exploit kits). UK MPs suggest holding CEO's responsible for breaches by hitting their pay. Tanium and FireEye and their rejected suitors. DoJ responds to the Silk Road appeal. Jonathan Katz from the University of Maryland explains the Etherium/DAO cryptocurrency heist, and Ryan Stolte from Bay Dynamics share results from a report on board room engagement with cyber.
Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
Some research suggests that 97 percent of organizations are already compromised, according to former Gartner analyst Eric Ouellet. And according to Ouellet the hackers are smarter and more persistent than ever, often having a better understanding of an organization's particular computing environment better than its owners. Recorded on the streets of San Francisco with Security Current's Vic Wheatman, Ouellet who is currently VP of Strategy for Bay Dynamics says that hackers will find a way to get inside an organization's network even if it takes a long time. There is only so much you can do to protect your environment, Ouellet adds and points to credit card companies use of anomalous behaviors as where the industry needs to head to mitigate attacks.
Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
The drumbeat of breaches -- Home Depot, Target, Jimmy John's and the list goes one -- continues almost daily. Why is this the case? It doesn't appear to be a lack of security investment or governance. As you'll hear from one former Gartner analyst who has 'gone over to the dark side,' a key problem is that individual security functions largely exist in isolated silos. Eric Ouellet, who is now VP of Strategy at Bay Dynamics, says this approach leads to data overload for security analysts causing fatigue and subsequently inadequate responses to attacks. Ouellet tells securitycurrent's Vic Wheatman that traditional approaches have flaws and generally lack the correlation of threat information from one silo to the rest, which would support holistic responses.
Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
Data Loss Prevention (DLP) solutions help keep private data private. Using various rules based on certain policies, sensitive information can be prevented from being exfiltrated. But CISOs are walking a fine line. They must be careful not to inhibit user and business processes lest there be dire business consequences. securitycurrent's Vic Wheatman speaks with ex-Gartner analyst Eric Ouellet, who is now Vice President of Strategy at Bay Dynamics, about how DLP actually works and where it can be used.