Podcasts about capsule8

  • 25PODCASTS
  • 45EPISODES
  • 43mAVG DURATION
  • ?INFREQUENT EPISODES
  • Aug 4, 2021LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about capsule8

Latest podcast episodes about capsule8

Avanet
#031 - Sophos News 08-2021

Avanet

Play Episode Listen Later Aug 4, 2021 39:24


## Firewall News Zu Beginn dieser Folge informieren wir über den Dynamic DNS Service "myfirewall.co" auf dem SFOS, welcher nur noch bis am 31. Januar 2022 zur Verfügung stehen wird. Zudem gibt es gute Neuigkeiten für Kunden, die von ihrer XG Firewall auf eine neue XGS Firewall wechseln und die Konfiguration übernehmen möchten. Sophos hat das EAP von SFOS 18.5.1 veröffentlicht, womit dieser Schritt nun möglich ist. ## Sophos Promos Die 100% Hardware-Rabatt Promo für Neukunden war für Sophos ein voller Erfolg. Daher wurde dieses Angebot in einem Zeitraum von über einem Jahr immer wieder verlängert. Da die XG Firewall spätestens Ende Jahr EOS geht, hat Sophos nun neue Promos vorgestellt. In dieser Podcastfolge findest du heraus, ob auch für dich ein interessantes Angebot dabei ist. ## Neue Zukäufe von Sophos im Juli Im Juli war Sophos mal wieder auf Einkaufstour und hat mit Capsule8 und Braintrace gleich zwei Firmen dazugekauft. Capsule8 ist ein Pionier und Marktführer im Bereich Schutz und Sicherheit von Linux-Systemen. Braintrace hat sich auf NDR (Network Detection and Response) Technologien spezialisiert. Was diese Zukäufe für die Produkte von Sophos bedeuten, erfahrt ihr in dieser Podcastfolge.

Zero To Exit
Academia To Entrepreneurship - John Viega (Founder & CEO, Capsule8)

Zero To Exit

Play Episode Listen Later Jul 29, 2021 39:28


In today's show we are pleased to have John Viega, Founder & CEO of Capsule8, a security startup focusing on infrastructure security for VMs and containers in public and private clouds.  Prior to founding Capsule8, John held leadership roles at BAE Systems, McAfee and many other cybersecurity companies. He has co-authored 6 books on security and is an adjunct professor of Computer Science at NYU. 

Audio News
SOPHOS ADQUIERE CAPSULE8 PARA AMPLIAR SU PROTECCIÓN A SERVIDORES LINUX

Audio News

Play Episode Listen Later Jul 29, 2021 6:56


Sophos, adquirió Capsule8. Impulsado por el drástico crecimiento de las plataformas en la nube, Linux se ha convertido en el sistema operativo dominante para cargas de trabajo de servidor, especialmente en aquellos que se utilizan para cargas de trabajo a gran escala, infraestructura de producción y almacenamiento de datos comerciales críticos.

Demo Diaries
Demo Diaries: Ep 021 | "The New Terms Is A Buyers Process Rather Than A Sales Process"

Demo Diaries

Play Episode Listen Later Jun 25, 2021 33:19


The CyberWire
WastedLocker being distributed in RIG campaign. Investigation of the DarkSide attack on Colonial Pipeline. More ransomware gangs go offline. Double encryption. Third-party stalkerware risk.

The CyberWire

Play Episode Listen Later May 18, 2021 24:56


A new RIG campaign is distributing WastedLocker. The US Congress considers two bills informed by the Colonial Pipeline incident, and Congressional committees are looking at the company’s response to the attack. More ransomware gangs go offline, but Conti is still trying to collect from the Irish government. Double encryption appears to be an emerging trend in ransomware. Ben Yelin looks at insurance companies clamping down on ransomware payments. Our guest is Nick Gregory of Capsule8 with thoughts on the Linux security landscape. And there’s another problem with stalkerware: third-party risk. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/10/95

Paul's Security Weekly
Check Your Alibis - ASW #142

Paul's Security Weekly

Play Episode Listen Later Mar 9, 2021 63:32


This week, we welcome Cynthia Burke, Compliance Manager at Capsule8, to discuss Privacy, Data Security & Compliance! In most IT shops, privacy, data security and compliance often resided under the same umbrella of ownership. While all 50 States in the US have data breach notification laws, we are seeing a shift in focus on data privacy globally. Privacy and data security compliance are often used interchangeably but this misuse in terminology (and the associated requirements for all IT organizations) creates a lot of confusion in an already complicated industry. Cynthia will explore some of the key factors in 2021 as to and why we need to get it right.   In the AppSec News, Making security engineering successful, Go's supply chain, mitigating JSON interoperability flaws, automating the hunt for deserialization flaws, the importance of observability, and what to do about Exchange!   Show Notes: https://securityweekly.com/asw142 Visit https://securityweekly.com/capsule8 to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Application Security Weekly (Audio)
Check Your Alibis - ASW #142

Application Security Weekly (Audio)

Play Episode Listen Later Mar 9, 2021 63:32


This week, we welcome Cynthia Burke, Compliance Manager at Capsule8, to discuss Privacy, Data Security & Compliance! In most IT shops, privacy, data security and compliance often resided under the same umbrella of ownership. While all 50 States in the US have data breach notification laws, we are seeing a shift in focus on data privacy globally. Privacy and data security compliance are often used interchangeably but this misuse in terminology (and the associated requirements for all IT organizations) creates a lot of confusion in an already complicated industry. Cynthia will explore some of the key factors in 2021 as to and why we need to get it right.   In the AppSec News, Making security engineering successful, Go's supply chain, mitigating JSON interoperability flaws, automating the hunt for deserialization flaws, the importance of observability, and what to do about Exchange!   Show Notes: https://securityweekly.com/asw142 Visit https://securityweekly.com/capsule8 to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Application Security Weekly (Video)
Privacy, Data Security & Compliance - Cynthia Burke - ASW #142

Application Security Weekly (Video)

Play Episode Listen Later Mar 8, 2021 32:17


In most IT shops, privacy, data security and compliance often resided under the same umbrella of ownership. While all 50 States in the US have data breach notification laws, we are seeing a shift in focus on data privacy globally. Privacy and data security compliance are often used interchangeably but this misuse in terminology (and the associated requirements for all IT organizations) creates a lot of confusion in an already complicated industry. Cynthia will explore some of the key factors in 2021 as to and why we need to get it right.   This segment is sponsored by Capsule8. Visit https://securityweekly.com/capsule8 to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw142

Paul's Security Weekly TV
Privacy, Data Security & Compliance - Cynthia Burke - ASW #142

Paul's Security Weekly TV

Play Episode Listen Later Mar 8, 2021 32:17


In most IT shops, privacy, data security and compliance often resided under the same umbrella of ownership. While all 50 States in the US have data breach notification laws, we are seeing a shift in focus on data privacy globally. Privacy and data security compliance are often used interchangeably but this misuse in terminology (and the associated requirements for all IT organizations) creates a lot of confusion in an already complicated industry. Cynthia will explore some of the key factors in 2021 as to and why we need to get it right.   This segment is sponsored by Capsule8. Visit https://securityweekly.com/capsule8 to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw142

Application Security Weekly (Audio)
Goose Egg - ASW #140

Application Security Weekly (Audio)

Play Episode Listen Later Feb 23, 2021 67:39


This week, we welcome Brandon Edwards, Co-Founder and Chief Scientist at Capsule8, to discuss Targeting, Exploiting, & Defending Linux! Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against Sudo as a timely reference. In the Application Security News, Dependency confusion for internal packages, Chrome pulls down the Great Suspender, Microsoft highlights web shells, some strategies on scaling AppSec, & more!   Show Notes: https://securityweekly.com/asw140 Visit https://securityweekly.com/capsule8 to learn more about them! To register for Capsule8's upcoming webcast "Preparing Linux Hosts for Unexpected Threats" visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
Goose Egg - ASW #140

Paul's Security Weekly

Play Episode Listen Later Feb 23, 2021 67:39


This week, we welcome Brandon Edwards, Co-Founder and Chief Scientist at Capsule8, to discuss Targeting, Exploiting, & Defending Linux! Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against Sudo as a timely reference. In the Application Security News, Dependency confusion for internal packages, Chrome pulls down the Great Suspender, Microsoft highlights web shells, some strategies on scaling AppSec, & more!   Show Notes: https://securityweekly.com/asw140 Visit https://securityweekly.com/capsule8 to learn more about them! To register for Capsule8's upcoming webcast "Preparing Linux Hosts for Unexpected Threats" visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Application Security Weekly (Video)
Targeting, Exploiting, & Defending Linux - Brandon Edwards - ASW #140

Application Security Weekly (Video)

Play Episode Listen Later Feb 22, 2021 34:13


Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against SUDO as a timely reference.   This segment is sponsored by Capsule8. Visit https://securityweekly.com/capsule8 to learn more about them! To register for Capsule8's upcoming webcast "Preparing Linux Hosts for Unexpected Threats" visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW.   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw140

Paul's Security Weekly TV
Targeting, Exploiting, & Defending Linux - Brandon Edwards - ASW #140

Paul's Security Weekly TV

Play Episode Listen Later Feb 22, 2021 34:13


Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against SUDO as a timely reference.   This segment is sponsored by Capsule8. Visit https://securityweekly.com/capsule8 to learn more about them! To register for Capsule8's upcoming webcast "Preparing Linux Hosts for Unexpected Threats" visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW.   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw140

The Cyber Ranch Podcast
Behavioral Economics & InfoSec w/ Kelly Shortridge

The Cyber Ranch Podcast

Play Episode Listen Later Feb 3, 2021 25:06


Behavioral Economics has altered our perceptions of what actually motivates human beings. How do these theories about our more primitive behaviors as well as our intellectual biases apply to information security? Allan Alford & Kelly Shortridge discuss in the context of infosec programs and events in a whirlwind of conversation. Sponsored by our friends at AttackIQ Podcast: The Cyber Ranch Podcast Episode 2: Behavioral Economics and InfoSec with Kelly Shortridge On this episode of The Cyber Ranch Podcast, host Allan Alford is joined by Kelly Shortridge, VP of Product Management at Capsule8. Their conversation begins with Kelly introducing herself and her work. She works in products for a security vendor, and she's done research into applying behavioral economics to security. Kelly says she grew up with a love of computers, but was mostly about building gaming rigs side of things. Her career in information security began in the investment banking industry, which led her to fall in love with security. Next, Allan asks Kelly about her work in behavioral economics. Economics is the study of choice, behavioral economics looks at the way humans actually behave by conducting experiments and observing natural occurrences. Humans don't always behave in the rational, textbook way, but Kelly explains that often their choices are rational when you factor in competing priorities. In information security, this shows up when folks find themselves reacting to threats that have the most attention, rather than those that are proven to be the most pressing. Information security is also affected by hindsight and outcome biases. Kelly explains how our brains try to trick us into blaming a single factor in a crisis, but that is not how the real world or cyber attacks work. Now that behavioral economics has clued us in to the biases formed by what Kelly affectionately refers to as our “lizard brains,” Allan wonders if we should be optimistic about how we may think and prevent attacks in the future. Kelly isn't so sure. She explains that changing some systems to be more compatible with our lizard brain has been effective, however knowing how we think doesn't help people think differently. In InfoSec, there are opportunities to continue making the secure way the easiest way, and circumvent the lizard brain. Other industries have been designing systems and workloads based on the way people behave; Kelly says InfoSec is just behind the curve. As the episode ends, Allan asks Kelly what keeps her still in InfoSec. Kelly says it is spite. There are still inefficiencies and an industry that pats itself on the back for doing little, that makes her spiteful she says. She wants to be an industry member that adds value to organizations and highlights the user. Follow Kelly on Twitter as @swagitda_ or on LinkedIn at Kelly Shortridge Learn more about Allan and the Cyber Ranch Podcast at Hacker Valley Studio Sponsored by our good friends at AttackIQ

CISO-Security Vendor Relationship Podcast
Security Is Suffering From DevOps FOMO

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Sep 22, 2020 33:28


All links and images for this episode can be found on CISO Series (https://cisoseries.com/security-is-suffering-from-devops-fomo/) Darn it. DevOps is having this awesome successful party and we want in! We've tried inserting ourselves in the middle (DevSecOps) and we launched a pre-party (shift left), but they still don't like us. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our sponsored guest this week is Dayo Adetoye (@dayoadetoye), senior manager - security architecture and engineering, Mimecast. Thanks to our sponsor, Capsule8. Capsule8 is defining modern enterprise protection by providing detection and response for Linux infrastructure in any environment. Capsule8 provides host-based detection and investigatory data for incident response with on-going support. Unlike anyone else, Capsule8 mitigates the financial, scalability and reliability limitations of protecting your Linux infrastructure. On this week’s episode Are we making the situation better or worse? What makes a successful phish? On Sophos' blog Paul Ducklin writes about their most successful phishing emails. Ducklin noted that most of the successful phishes dealt with mundane and undramatic issues that still had a sense of importance. Looking at these examples they do seem to follow a similar pattern of something looking official that is being requested from the company and could you click here to check it out. Is that the majority of what you're testing? If so, what exactly is the value in conducting phishing tests on employees? Can the testing have a negative effect in security or even morale? There’s got to be a better way to handle this What is the right approach to threat modeling? In a blog post, Chris Romeo of Security Journey opines that formal training or tools won't work. Security needs to ask questions of developers about features and then show them how a threat evolves, thus allowing them to ultimately do it themselves. Adam Shostack of Shostack and Associates advocates for formal training. He says Romeo's informal approach to threat modeling sounds attractive, but doesn't work because you're trying to scale threat modeling across developers and if you tell one developer the information it's going to be passed down like a game of telephone where each successive person tells a distorted version of what the last person said. So what's the right approach to building threat models across a DevOps environment? What's Worse?! What's the worst place to find your company assets? Close your eyes and visualize the perfect engagement Shifting Left. DevSecOps, These are the mechanisms that have been used to infuse security into the DevOps supply chain. While noble, both concepts break the philosophy and structure of DevOps which is based on automation, speed, and delivery. But, DevOps is also about delivering quality. So rather than inserting themselves, how does security participate in a way that DevOps already loves? If you haven’t made this mistake, you’re not in security On AskNetSec on reddit, Triffid-oil asked, "What was something that you spent effort learning and later realized that it was never going to be useful?" And let me add to that, it's something either someone told you or you believed for some reason it was critical for your cybersecurity education and you later realized it wasn't valuable at all.

CISO-Security Vendor Relationship Podcast
Enjoying My Blissful Ignorance of Cyber Vulnerabilities

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Sep 15, 2020 35:46


All links and images for this episode can be found on CISO Series (https://cisoseries.com/enjoying-my-blissful-ignorance-of-cyber-vulnerabilities/) What keeps me up at night? Nothing! That's because I hold onto cybersecurity myths because it makes me believe I don't have a security problem. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our guest this week is Dustin Wilcox, CISO, Anthem. Thanks to our sponsor, Capsule8 Capsule8 is defining modern enterprise protection by providing detection and response for Linux infrastructure in any environment. Capsule8 provides host-based detection and investigatory data for incident response with on-going support. Unlike anyone else, Capsule8 mitigates the financial, scalability and reliability limitations of protecting your Linux infrastructure. On this week’s episode Why is everybody talking about this now Kris Rides of Tiro Security asks, "When writing a job description in cybersecurity, what's your process?" What in the job description is most important that you want potential candidates to know? And do you have any universal requirements of all candidates? Is this a cyber security disinformation campaign? Stuart Mitchell of Stott and May posted an article from FoxNews on cybersecurity myths, such as I don't have anything worth protecting, I will know when something bad happens. From this list, or possibly another myth, which one do you think is the most damaging? What's Worse?! Public or government interference? There’s got to be a better way to handle this Why are InfoSec professionals still struggling to secure their cloud environments? According to a study by Dimension Research, sponsored by Tripwire, 76 percent admit to having trouble. And only 21 percent they're assessing their overall cloud security posture in real time or near real time. What are the quarter of security professionals doing who are not struggling with securing the cloud? Close your eyes and visualize the perfect engagement Do we need more cybersecurity professionals, or do we just need our general workforce to be more cybersecurity minded? Phil Venables, Board Director - Goldman Sachs Bank, makes a good argument for the latter. Mike has mentioned that when he can make cybersecurity personal, like offering employees a password manager, they start to see the value. Assuming making security personal is the best tactic, what is the ripple effect of that? How do they approach security at your business and how do the efforts of the security team change?

CISO-Security Vendor Relationship Podcast
Tell Me We're Secure So I Can Go Back to Ignoring Security

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Sep 8, 2020 33:34


All links and images for this episode can be found on CISO Series (https://cisoseries.com/tell-me-were-secure-so-i-can-go-back-to-ignoring-security/) I don't know anything about our state of security. I don't want to know either. But I do want to know you know about security and there's nothing I have to worry about. You can do that, right? This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our guest this week is Dan Walsh, CISO, Rally Health. Thanks to our sponsor, Capsule8. Capsule8 is defining modern enterprise protection by providing detection and response for Linux infrastructure in any environment. Capsule8 provides host-based detection and investigatory data for incident response with on-going support. Unlike anyone else, Capsule8 mitigates the financial, scalability and reliability limitations of protecting your Linux infrastructure. On this week's episode Why is everybody talking about this now How do you respond to "Are we secure?" It's a loaded question that we've addressed previously. Daniel Hooper, CISO, Varo Money brought up this topic again that caused a flurry of discussion on LinkedIn. In the past Mike has mentioned that he talks about the state of his security program and where it's heading. The core of this question is anxiety about something a non-security person doesn't understand. How does a security leader break down this question into small parts, and what question should a CEO be asking if not "Are we secure?" There’s got to be a better way to handle this The engineering team at Rally Health is around 800 and our guest Dan has a security team of 30+ of which only 5 of them are application security people. Those five are definitely going to need some help if they're going to have an impact on how secure the applications are. I ask Dan Walsh what he's doing with the engineers that's turning them into application security force multipliers. What's Worse?! How damaging is a bad reputation? What do you think of this vendor marketing tactic? CISOs have ways to retalilate against aggressive sales tactics. George Finney, CISO at Southern Methodist University told a story on LinkedIn about an unsolicited sales invite that was sent to 65 people at his school. He blocked the email. He asked the community if that was too harsh. Similarly Steve Zalewski, deputy CISO of Levi's said if he sees aggressive tactics by a company, the security team has the ability to block the whole domain from their servers. Are these tactics too harsh? Have Mike and our guest taken similar tactics, and/or is there something else they do in response to extremely aggressive sales tactics? If you haven’t made this mistake, you’re not in security How prepared do you need to handle your next cyber job? A question was asked on reddit from someone who wasn't sure they should take a job because they didn't have all the skills to do the job. Most people just said, "Do it." How would Mike and our guest answer this question as an employee and a manager. What level of unpreparedness for a job is acceptable and possibly even exciting? Could too much result in imposter syndrome?

Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw
Ep. 045: Improving the quality of cyber security (w/ Kelly Shortrige, Capsule8)

Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw

Play Episode Listen Later Jul 15, 2020 23:30


In this episode of Cyber Security Matters, Dominic and Christian talk with Kelly Shortridge. Kelly's career began in Information Security and Data Analytics in Investment Banking. Along with this, she was also interested in the Infotech space, in which she saw lapses and holes in the industry that she passionately wanted to fix. Soon after, she created a startup which was eventually acquired by a large cybersecurity company. From there, Kelly realized that she loved solving real cybersecurity problems that customers have. Kelly researches applications of behavioral economics to information security and uses this knowledge in her current role as the VP of Product Management & Strategy in Capsule8. She discusses the different problems and issues happening in the Cyber Security industry and how we can improve the quality of the security services we provide to our clients. --- Cyber Security Matters is a partnered program of Conversations That Matter. This show is produced by Oh Boy Productions, video production, podcast and vidcast specialists located in Vancouver. To find out more, go to http://www.ohboy.ca #cybersecurity #computers #cybersec

The Secure Developer
Ep. #63, Container Security, Microservices, and Chaos Engineering with Kelly Shortridge, VP of Product Strategy at Capsule8

The Secure Developer

Play Episode Listen Later May 28, 2020 34:44


On today's episode, Guy Podjarny talks to Kelly Shortridge about security, microservices, and chaos engineering. Kelly is currently VP of product strategy at Capsule8, following product roles at SecurityScorecard, BAE Systems Applied Intelligence, as well as co-founding IperLane, a security startup which was acquired. Kelly is also known for presenting at international technology conferences, on topics ranging from behavioral economics at Infosec to chaos security engineering. In this episode, Kelly explains exactly what product strategy and management means, and goes into the relationships and tensions between dev, ops, and security and how that has changed. We also discuss container security and how it is different from any other end point security systems, as well as the difference between container security and microservices. Kelly believes that we are overlooking a lot of the benefits of microservices, as well as the applications for chaos engineering in security. Tune in to find out what changes Kelly sees happening in the industry, and see what advice she has for teams looking to level up their security!

Questioning Behaviour
Ep 3. Information Security (ft. Kelly Shortridge)

Questioning Behaviour

Play Episode Listen Later May 4, 2020 55:52


Sarah Bowen and Merle van den Akker interview Kelly Shortridge on how behavioural science is applied to information security.Kelly Shortridge is VP of Product Strategy at Capsule8. Before that, Kelly was the Product Manager for cross-platform detection capabilities at BAE Systems Applied  Intelligence as well as co-founder and COO of IperLane.  In her spare time, she researches applications of behavioural economics to information security, on which she’s spoken at conferences internationally. Finding Kelly Shortridge: Business: https://www.linkedin.com/in/kellyshortridge/ Personal: https://swagitda.com/ Capsule8: https://capsule8.com/ Secret link: https://www.techradar.com/uk/best/password-manager Research mentioned: Verizon data breach investigations report: https://enterprise.verizon.com/resources/executivebriefs/2019-dbir-executive-brief.pdf Questioning Behaviour Socials: Facebook: @QBpodcast (https://www.facebook.com/QBPodcast) Insta: @questioningbehaviour (https://www.instagram.com/questioningbehaviour/) Twitter: @QB_podcast (https://twitter.com/QB_Podcast) LinkedIn: @Questioning Behaviour (https://www.linkedin.com/groups/8928118/) Music: Derek Clegg “You’re the Dummy” https://derekclegg.bandcamp.com/

Decipher Security Podcast
Kelly Shortridge

Decipher Security Podcast

Play Episode Listen Later Dec 16, 2019 25:08


Ransomware has become an ugly fact of life for enterprises, and incorporating it into threat models and disaster recovery plans is a must. Kelly Shortridge of Capsule8 joins Dennis Fisher to discuss her untested hypothesis that achieving an economic equilibrium with professional ransomware attackers could be beneficial for both sides. Read Kelly's piece on this hypothesis here.

Cyber Work
Cognitive biases in security decision-making

Cyber Work

Play Episode Listen Later Dec 9, 2019 42:38


Kelly Shortridge, VP of Product Strategy at Capsule8, and Cyber Work podcast host Chris Sienko discuss how for introduce security teams early into the product development process, as well as cognitive biases in security decision-making at all levels of employment from analysts to CISOs. View the transcript, additional episodes and promotional offers: https://www.infosecinstitute.com/podcast. Join us in the fight against cybercrime: https://www.infosecinstitute.com.

Data Science Salon Podcast
Applications of Data Science in Media & Entertainment

Data Science Salon Podcast

Play Episode Listen Later Oct 21, 2019 41:59


The Media and Entertainment industry has undeniably been heavily disrupted by changes in technology. Listen as Ayan Battacharya, Advanced Analytics Specialist Leader at Deloitte Consulting and Harini Krishnan, Data Scientist at Capsule8, share observations they've garnered from their own experience on the state of data science in Media & Entertainment, live from DSS NYC 2019.

Enterprise Security Weekly (Video)
Enterprise News - ESW - News #149

Enterprise Security Weekly (Video)

Play Episode Listen Later Aug 16, 2019 23:00


Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8! Full Show Notes: https://wiki.securityweekly.com/ES_Episode149 Visit https://www.securityweekly.com/esw for all the latest episodes!

Paul's Security Weekly TV
Brandon Edwards, Capsule8 - ESW #148

Paul's Security Weekly TV

Play Episode Listen Later Aug 16, 2019 35:58


Containers are a hot topic because of the simplicity they bring to the process of software development, shipping, and deployment. It is important to understand the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future. Full Show Notes: https://wiki.securityweekly.com/ES_Episode148 Visit https://www.securityweekly.com/esw for all the latest episodes!

Paul's Security Weekly TV
Enterprise News - ESW #149

Paul's Security Weekly TV

Play Episode Listen Later Aug 16, 2019 23:00


Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8! Full Show Notes: https://wiki.securityweekly.com/ES_Episode149 Visit https://www.securityweekly.com/esw for all the latest episodes!

Enterprise Security Weekly (Video)
Brandon Edwards, Capsule8 - ESW #148

Enterprise Security Weekly (Video)

Play Episode Listen Later Aug 15, 2019 35:58


Containers are a hot topic because of the simplicity they bring to the process of software development, shipping, and deployment. It is important to understand the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future. Full Show Notes: https://wiki.securityweekly.com/ES_Episode148 Visit https://www.securityweekly.com/esw for all the latest episodes!

Paul's Security Weekly
The Shady Stuff - ESW #149

Paul's Security Weekly

Play Episode Listen Later Aug 15, 2019 93:54


This week, Paul and Matt Alderman interview Mehul Revankar, Senior Product manager at SaltStack, to discuss the Sec and Ops Challenge! In the Enterprise Security News, Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8! In our final segment, we air three pre-recorded interviews with NETSCOUT, Remediant, and BitDefender from BlackHat USA 2019!   To learn more about NetScout, visit: https://securityweekly.com/netscout Full Show Notes: https://wiki.securityweekly.com/ES_Episode149   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Enterprise Security Weekly (Audio)
The Shady Stuff - ESW #149

Enterprise Security Weekly (Audio)

Play Episode Listen Later Aug 15, 2019 93:54


This week, Paul and Matt Alderman interview Mehul Revankar, Senior Product manager at SaltStack, to discuss the Sec and Ops Challenge! In the Enterprise Security News, Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8! In our final segment, we air three pre-recorded interviews with NETSCOUT, Remediant, and BitDefender from BlackHat USA 2019!   To learn more about NetScout, visit: https://securityweekly.com/netscout Full Show Notes: https://wiki.securityweekly.com/ES_Episode149   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
That's An Illusion - ESW #148

Paul's Security Weekly

Play Episode Listen Later Aug 13, 2019 108:49


This week, we are LIVE from BlackHat 2019, as we welcome John Smith, Principal Sales Engineer of Security at ExtraHop, to discuss Network Detection & Response! In our second segment, we welcome Joe Gillespie, Enterprise Account Executive at Netsparker, to talk about Managing Vulnerabilities in the Enterprise! In the final segment, we welcome Brandon Edwards, Chief Scientist at Capsule8, to discuss the importance of understanding the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future!   To learn more about Netsparker, visit: https://netsparker.com/securityweekly To learn more about ExtraHop, visit: https://extrahop.com/securityweekly Full Show Notes: https://wiki.securityweekly.com/ES_Episode148   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Enterprise Security Weekly (Audio)
That's An Illusion - ESW #148

Enterprise Security Weekly (Audio)

Play Episode Listen Later Aug 13, 2019 108:49


This week, we are LIVE from BlackHat 2019, as we welcome John Smith, Principal Sales Engineer of Security at ExtraHop, to discuss Network Detection & Response! In our second segment, we welcome Joe Gillespie, Enterprise Account Executive at Netsparker, to talk about Managing Vulnerabilities in the Enterprise! In the final segment, we welcome Brandon Edwards, Chief Scientist at Capsule8, to discuss the importance of understanding the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future!   To learn more about Netsparker, visit: https://netsparker.com/securityweekly To learn more about ExtraHop, visit: https://extrahop.com/securityweekly Full Show Notes: https://wiki.securityweekly.com/ES_Episode148   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Real World DevOps
InfoSec For DevOps Engineers with Kelly Shortridge

Real World DevOps

Play Episode Listen Later May 23, 2019 29:30


My guest this week is Kelly Shortridge, VP of Product Strategy at Capsule8, and we’re talking about infosec. We get into some interesting discussion: threat modeling, foundational security defense, why you’re totally screwed if a nation-state is after you (tip: they’re probably not), and why chaos engineering and ephemeral infrastructure is actually great for security. Also, we totally crap on security vendor FUD for a bit and how to choose security tools that actually work.

DevOps Chat
Shift Right DevSecOps w/ Capsule8 & Pete Markowsky

DevOps Chat

Play Episode Listen Later May 3, 2019 25:32


Capsule8 is focused on protecting Linux infrastructure whether in the cloud, in containers or even bare metal. The team is make up of industry veterans who understand the problems security pros face, as well as the frustrations of developers, devops and sys admins deal with every day. Their approach is more of a shift right DevSecOps, focusing on detecting attacks, threats and vulnerabilities on production infrastructure. I spoke with co-founder & chief architect, Pete Markowsky in this DevOps chat. Have a listen and hopefully learn

Enterprise Security Weekly (Video)
ShieldX, Tenable, & Capsule8 - Enterprise Security Weekly #134

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 26, 2019 30:28


In the Enterprise news, ShieldX adds lateral movement prevention to the Elastic Security Platform for AWS, Tenable Integrates with Google Cloud Security Command Center, Capsule8 to help Google Cloud SCC members consolidate findings and speed up response, and Evident and Okta partnership simplifies identity verification and reduces risk for businesses! Full Show Notes: https://wiki.securityweekly.com/ES_Episode134 Visit https://securityweekly.com/esw for all the latest episodes!

enterprise aws google cloud okta scc evident tenable command center command conquer capsule8 enterprise security weekly enterprise news shieldx google cloud scc elastic security platform es episode134 visit
Paul's Security Weekly TV
ShieldX, Tenable, & Capsule8 - Enterprise Security Weekly #134

Paul's Security Weekly TV

Play Episode Listen Later Apr 26, 2019 30:28


In the Enterprise news, ShieldX adds lateral movement prevention to the Elastic Security Platform for AWS, Tenable Integrates with Google Cloud Security Command Center, Capsule8 to help Google Cloud SCC members consolidate findings and speed up response, and Evident and Okta partnership simplifies identity verification and reduces risk for businesses! Full Show Notes: https://wiki.securityweekly.com/ES_Episode134 Visit https://securityweekly.com/esw for all the latest episodes!

enterprise aws google cloud okta scc evident tenable command center command conquer capsule8 enterprise security weekly enterprise news shieldx google cloud scc elastic security platform es episode134 visit
Enterprise Security Weekly (Audio)
Creativity Points - Enterprise Security Weekly #134

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 25, 2019 80:48


This week, Paul Asadoorian is joined by Matt Alderman, as we interview Francis Dinha, the CEO of OpenVPN! In the Enterprise News, ShieldX adds lateral movement prevention to the Elastic Security Platform for AWS, Tenable Integrates with Google Cloud Security Command Center, Capsule8 to help Google Cloud SCC members consolidate findings and speed up response, and Evident and Okta partnership simplifies identity verification and reduces risk for businesses! In the final segment, Security Legend Dave Kennedy sits down with our Founder and CTO Paul Asadoorian at InfoSec World 2019 to discuss his company Binary Defense and how they're helping the Security community!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode134 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

ceo founders creativity security points legendary enterprise best friends aws google cloud okta scc evident tenable command center command conquer openvpn dave kennedy infosec world paul asadoorian capsule8 binary defense enterprise security weekly matt alderman enterprise news francis dinha shieldx google cloud scc security legend dave kennedy es episode134 visit elastic security platform
Paul's Security Weekly
Creativity Points - Enterprise Security Weekly #134

Paul's Security Weekly

Play Episode Listen Later Apr 25, 2019 80:48


This week, Paul Asadoorian is joined by Matt Alderman, as we interview Francis Dinha, the CEO of OpenVPN! In the Enterprise News, ShieldX adds lateral movement prevention to the Elastic Security Platform for AWS, Tenable Integrates with Google Cloud Security Command Center, Capsule8 to help Google Cloud SCC members consolidate findings and speed up response, and Evident and Okta partnership simplifies identity verification and reduces risk for businesses! In the final segment, Security Legend Dave Kennedy sits down with our Founder and CTO Paul Asadoorian at InfoSec World 2019 to discuss his company Binary Defense and how they're helping the Security community!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode134 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

ceo founders creativity security points legendary enterprise best friends aws google cloud okta scc evident tenable command center command conquer openvpn dave kennedy infosec world paul asadoorian capsule8 binary defense enterprise security weekly matt alderman enterprise news francis dinha shieldx google cloud scc security legend dave kennedy es episode134 visit elastic security platform
Cyber Casts
The Cybersecurity Industrial Complex

Cyber Casts

Play Episode Listen Later Mar 4, 2019 24:06


Last year, investors poured $5 billion in cybersecurity startups. The whole industry will be worth $170 billion in three years, according to a recent estimate. There's so many infosec companies it's hard to keep track of them. And yet, are we all really secure? Is the infosec industry really keeping us safe? Is it even focusing on the right problems?Next week, tens of thousands of people will meet in San Francisco for the year's biggest information security gathering focused on business: the RSA Conference.Kelly Shortridge is the vice president of product strategy at Capsule8, a New York City-based security startup. Kelly has a background in economics, investment banking, and has studied the infosec market. She's here today to help us understand why the infosec industry is so big, and what's wrong with it. See acast.com/privacy for privacy and opt-out information.

CYBER
The Cybersecurity Industrial Complex

CYBER

Play Episode Listen Later Mar 4, 2019 24:06


Last year, investors poured $5 billion in cybersecurity startups. The whole industry will be worth $170 billion in three years, according to a recent estimate. There’s so many infosec companies it's hard to keep track of them. And yet, are we all really secure? Is the infosec industry really keeping us safe? Is it even focusing on the right problems?Next week, tens of thousands of people will meet in San Francisco for the year’s biggest information security gathering focused on business: the RSA Conference.Kelly Shortridge is the vice president of product strategy at Capsule8, a New York City-based security startup. Kelly has a background in economics, investment banking, and has studied the infosec market. She’s here today to help us understand why the infosec industry is so big, and what’s wrong with it. See acast.com/privacy for privacy and opt-out information.

Ubuntu Security Podcast

This week we cover security updates including Firefox, Thunderbird, OpenSSL and another Ghostscript regression, plus we look at a recent report from Capsule8 comparing Linux hardening features across various distributions and we answer some listener questions.

Paul's Security Weekly TV
PCI, Capsule8, & Polaris - Enterprise Security Weekly #128

Paul's Security Weekly TV

Play Episode Listen Later Mar 2, 2019 31:05


Capsule8 expands threat detection platform for PCI DSS, BitSight unveils peer analytics for more effective security performance management, Imperva advances autonomous application protection capabilities, and Synopsys launches Polaris Software integrity platform! Full Show Notes: https://wiki.securityweekly.com/ES_Episode128 Visit http://securityweekly.com/esw for all the latest episodes!

security analytics enterprise polaris pci pci dss synopsys imperva bitsight capsule8 enterprise security weekly polaris software es episode128 visit
Enterprise Security Weekly (Video)
PCI, Capsule8, & Polaris - Enterprise Security Weekly #128

Enterprise Security Weekly (Video)

Play Episode Listen Later Mar 1, 2019 31:05


Capsule8 expands threat detection platform for PCI DSS, BitSight unveils peer analytics for more effective security performance management, Imperva advances autonomous application protection capabilities, and Synopsys launches Polaris Software integrity platform! Full Show Notes: https://wiki.securityweekly.com/ES_Episode128 Visit http://securityweekly.com/esw for all the latest episodes!

security analytics enterprise polaris pci pci dss synopsys imperva bitsight capsule8 enterprise security weekly polaris software es episode128 visit
Enterprise Security Weekly (Audio)
Getting In & Getting Out - Enterprise Security Weekly #128

Enterprise Security Weekly (Audio)

Play Episode Listen Later Feb 28, 2019 58:59


This week, Paul is joined by Matt Alderman to discuss some Funding and M&A, such as Elevate Security announces an $8 million series A to alter employee security behavior, Armorblox raises 16.5 million in series A, Bandura Cyber raises 10 million in venture funding, and much more! In the Enterprise Security News, Capsule8 expands threat detection platform for PCI DSS, BitSight unveils peer analytics for more effective security performance management, Imperva advances autonomous application protection capabilities, and Synopsys launches Polaris Software integrity platform!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode128 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

news security funding analytics enterprise polaris series b pci pci dss synopsys imperva bitsight security weekly esw seriesa elevate security paul asadoorian capsule8 armorblox matt alderman enterprise security weekly polaris software manews enterprise security news es episode128 visit
Paul's Security Weekly
Getting In & Getting Out - Enterprise Security Weekly #128

Paul's Security Weekly

Play Episode Listen Later Feb 28, 2019 58:59


This week, Paul is joined by Matt Alderman to discuss some Funding and M&A, such as Elevate Security announces an $8 million series A to alter employee security behavior, Armorblox raises 16.5 million in series A, Bandura Cyber raises 10 million in venture funding, and much more! In the Enterprise Security News, Capsule8 expands threat detection platform for PCI DSS, BitSight unveils peer analytics for more effective security performance management, Imperva advances autonomous application protection capabilities, and Synopsys launches Polaris Software integrity platform!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode128 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly  

news security funding analytics enterprise polaris series b pci pci dss synopsys imperva bitsight security weekly esw seriesa elevate security paul asadoorian capsule8 armorblox matt alderman enterprise security weekly polaris software manews enterprise security news es episode128 visit
Security Conversations
Dino Dai Zovi, co-founder and CTO, Capsule8

Security Conversations

Play Episode Listen Later Jan 11, 2018 39:57


Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.