Podcasts about cequence security

  • 11PODCASTS
  • 15EPISODES
  • 31mAVG DURATION
  • ?INFREQUENT EPISODES
  • Dec 20, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cequence security

Latest podcast episodes about cequence security

Easy Prey
Fake vs. Taken-Over Accounts with Jason Kent and Will Glazier

Easy Prey

Play Episode Listen Later Dec 20, 2023 45:25


As we approach the next season, threat actors will be keeping a close eye on dating apps. These apps have become a prime target for threat actors due to the size of the market expanding to over 300 million users and the rich information stored in these apps.  Today's guests are Jason Kent and Will Glazier. Jason is a hacker-in-residence at Cequence Security. He has a diverse information security, networking, and IT background and a generous level of knowledge for most pieces of the IT spectrum including firewalls, security architecture, security controls, and security infrastructure. Will Glazier is the Head of Threat Research at Cequence Security where they protect some of the world's largest brands from sophisticated bot attacks and threats against the public facing APIs. Will has a background in fraud abuse and prevention as well as building threat intelligence systems.   Show Notes: [1:18] - Jason and Will share their backgrounds and current roles at Cequence Security. [5:24] - As common as scams and fraud are, even Jason and Will have personal experience with them. [7:39] - Dating app attacks are particularly hard because they prey on vulnerable people. There are so many cases, that there should not be shame around talking about it. [9:32] - The first red flag is when someone you are talking to on a dating app tries to get you over to texting or another app. [11:37] - In any given month, the amount of malicious API transactions that Cequence is blocking is in the billions. [13:52] - Fake accounts are constantly made but not as heavily used as taken over accounts. [16:08] - Scammers are now paying for premium accounts to appear more legitimate and the investment pays off when they scam someone. [18:11] - There are tools people can buy to make all accounts look real through automation. [19:29] - It is essential that people in a fraud department can trust the information and push it out to Cequence. [22:04] - Some organizations will pay a ransom to decrease the time wasted and money lost. In their eyes, the money lost to pay the ransom isn't as much. [26:11] - Margins are getting tighter for the bad guys. [30:31] - The infrastructure that scammers use varies. There are some that are really well known at Cequence and some that are more difficult. [32:51] - It is easier to take out one big player than to take out hundreds of small ones. [36:03] - There are human and political pressures that make things more challenging for security. [38:07] - Romance scammers are employing new tactics and switching them up. [39:48] - If you put too much trust in the platform that it makes you trust the random person you're talking to, take a step back. [42:40] - Take a look online for things that have been done by scammers historically, especially if you are new to dating apps. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cequence Security Website

The Tech Blog Writer Podcast
2466: Shadow API Usage Surges 900%, Revealing Lack of API Visibility Among Enterprises

The Tech Blog Writer Podcast

Play Episode Listen Later Aug 5, 2023 36:00


On this episode of Tech Talks Daily, I sit down with William Glazier, an expert from Cequence Security, and Terry Ray, a seasoned veteran from Imperva, to delve into the ins and outs of the groundbreaking "API Protection Report: Holiday Build-up Shows 550% Jump in Unique Threats." This revealing report is based on an analysis of approximately a trillion transactions spanning a variety of industries and uncovers the pressing API threat trends that are currently challenging organizations. We unpack key findings, such as a 900% spike in shadow APIs, a worrying 550% increase in unique threats during the holiday season, and a surprising revelation that API and web application security tactics are being combined by attackers, leading to a 220% increase in anomalous traffic. Join us as we dive deep into the conversation about the vital role of API security in today's digital landscape and how Cequence Security stands out with its history of mitigating bot attacks and its keen focus on both risk analysis and blocking malicious traffic. We'll also explore the alarming rise in fraud and retool attempts in the telecom industry and discuss how businesses can navigate the expanding threat landscape while safeguarding both legacy and new APIs. Listen in as we envision the future of API security, highlighting the role of generative AI in developing robust testing methods and ensuring that security becomes an integrated part of application development. Don't miss this eye-opening episode that sets a new standard in understanding the evolving threats and strategies in API security.

Security Breach
Hacker's Insight: 'How Can I Make Stuff Worse'

Security Breach

Play Episode Play 43 sec Highlight Listen Later Feb 13, 2023 26:46


The potential of smarter factories driven by advanced technologies and greater connectivity is exciting … but equally daunting.That's because in our enthusiasm to embrace all the time and cost savings associated with the machines, automation and data associated with these advancements, the industrial sector often pushes one of the most important aspects of all this connectivity into the realm of tomorrow's problems.Well, tomorrow is here. There are over 20 billion connected devices in the industrial sector – and that's a number projected to nearly double in the next five years.Joining us to discuss what all these connected devices will mean to cybersecurity planning is Jason Kent, Hacker in Residence at Cequence Security, a leader in API protection solutions.We're excited to announce that Security Breach is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to rockwellautomation.comTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.comTo download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.

The Threatpost Podcast
Top 3 Attack Trends in API Security – Podcast

The Threatpost Podcast

Play Episode Listen Later Mar 23, 2022 21:40


21:40 false Bots & automated attacks have exploded, with attackers and developers alike in love with APIs, according to a new Cequence Security report. Hacker-in-residence Jason Kent explains the latest. full

Komando On Demand
A threat to your online security hiding in plain sight

Komando On Demand

Play Episode Listen Later Jun 8, 2021 33:45


With the internet of things, you can open doors and turn on lights with one tap on your phone. That's a lot of power — so what happens when a hacker takes over your home network? Kim speaks with Cequence Security hacker Jason Kent, who shares some scary stories about what can happen if you aren't careful. You'll also get a ton of cybersecurity tips to make sure your online security is airtight! Learn more about your ad choices. Visit megaphone.fm/adchoices

Kim Komando Today
A threat to your online security hiding in plain sight

Kim Komando Today

Play Episode Listen Later Jun 8, 2021 33:45


With the internet of things, you can open doors and turn on lights with one tap on your phone. That's a lot of power — so what happens when a hacker takes over your home network? Kim speaks with Cequence Security hacker Jason Kent, who shares some scary stories about what can happen if you aren't careful. You'll also get a ton of cybersecurity tips to make sure your online security is airtight! Learn more about your ad choices. Visit megaphone.fm/adchoices

Komando On Demand
A threat to your online security hiding in plain sight

Komando On Demand

Play Episode Listen Later Jun 8, 2021 39:44


Can service chatbots threaten your digital safety? Kim speaks with Cequence Security hacker Jason Kent about how bots as a service can cause data breaches. For instance, did you know someone can manipulate your internet-connected gadgets to take over your garage door? In this episode, you'll find easy explanations for complex issues plus a ton of cybersecurity tips. Learn more about your ad choices. Visit megaphone.fm/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
The Cequence Security Story — Chapter 3 | With Matt Keil

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 26, 2020 22:07


A Their Story Podcast with Sean Martin and Marco Ciappelli Guest: Matt Keil The organization telling us their story today is Cequence Security. Last time we saw Matt Keil in person was at the Black Hat conference in Las Vegas 2019, where we discussed the Internet of Things (IoT), bots and botnets, and the role APIs play in running an organization. APIs are engrained in pretty much everything we do, and these modules and services continue to get more entrenched in every aspect of the business infrastructure as it enables organizations to easily deliver new capabilities to their employees, partners, and customers. With the APIs come a large number of entry points for bad actors to target. How many APIs are used within an organization, you ask? Many don't know - but Cequence can provide a view into this complex environment, giving organizations a full visual footprint of the APIs in use and then provide a risk score and further inspection to identify vulnerabilities and other gaps that could lead to a compromise. Describing the API environment as "connective tissue," Matt shares a number of examples of how API-based risk exposure, vulnerability exploitation, and escalation of privilege can become a thing of the past when using the discovery and continuous monitoring capabilities in Ceqeuence Security's API Sentinel product. Want to learn more about this? Be sure to visit Cequence Security at https://itspm.ag/itspcequweb to learn more about their offering. Read About The Product Launch: https://itspm.ag/3fZ9A1u Learn More About API Sentinel: https://itspm.ag/383hX9w

ITSPmagazine | Technology. Cybersecurity. Society
Their Story | Cequence Security | A Conversation With Jason Kent | RSA Conference 2020

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 22, 2020 27:12


A Their Story interview with Sean Martin and Marco Ciappelli Guest: Jason Kent The organization telling us their story today is Cequence Security. Get ready for history to repeat itself. The down and dirty story of web application security. We’ve had a real problem in getting the web to run securely, and we still have some challenges with web application security—it should not come as a surprise to anyone that, while this environment is getting better, it is still pretty much misunderstood. Even though we’ve raised awareness for DevSecOps over the years—we still see some issues with the OWASP Top 10 (as one measuring stick). However, while we continue to try to figure out that space, we've pretty much gotten it to the point where most of the big ticket items are taken care (by those that take it seriously, anyway). However, since we are humans, we seem to be repeating all of these same mistakes in a different part of the application world—the API layer. We're forgetting that the API layer is really meant for computer to computer communications, changing the game for how we approach authentication, access control, communications, instructions, behaviors, and more. As one example, things like rate limiting can really become a problem if not addressed. To help us understand this world better, have a listen to Jason Kent, Hacker in Residence at Cequence Security, as he shares with us some of the fun ways he hacks on applications—namely through APIs. Learn more about Cequence on ITSPmagazine here: https://www.itspmagazine.com/company-directory/cequence For more stories from RSA Conference 2020, be sure to visit https://www.itspmagazine.com/rsa-conference-usa-2020-rsac-san-francisco-coverage

ITSPmagazine | Technology. Cybersecurity. Society
Their Story At Hacker Summer Camp | Las Vegas 2019 | Will Glazier And Matt Keil, Cequence Security

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 3, 2019 27:35


A Their Story interview with Sean Martin & Marco Ciappelli Guests: - Will Glazier, Head of CQ Crime Research, Cequence Security - Matt Keil, Director of Product Marketing, Cequence Security The organization telling us their story today is Cequence Security. Marco and I get to talk to a lot of people. Through these conversations, we get to hear a lot of stories. Some of the best story-telling events are those that include a couple of people that have different paths, experiences, and perspectives. This is one of those stories. During Black Hat, we had the chance to meet two of these individuals from Cequence Security: one is a security research veteran that has been with the company for a long time and the other a new-hire but with a long and solid history of looking after product marketing for another very well-known security brand. Relative to their different ages—and conversely, their tenure at Cequence—both employees have been in the cybersecurity industry for quite some time; each with his own personal path into the field and a somewhat different career path once in the space. As you will hear, their diversity makes for quite a fun and intriguing conversation. During our chat, we get to talk about a lot of things, including: - the birth and evolution of a start-up; - the potential liability a company may incur if they have a massive infrastructure built of IoT devices that get compromised, and; - bots and other automated devices that can be turned into a cyber army with evil plans and unpleasant consequences for the Internet and its users. We also look at the role of APIs in the world of computing—where machines and services will act on our behalf. What is human? What is not? What is supposed to be acting like us as a human and therefore we don’t want that activity or transaction to be blocked just because it is a computer system working on our behalf? This is the part of the story where the famous four pillars of detection came into play. Known as The Tools, The Infrastructures, The Credentials, and The Behavior can help to fight the good fight and find out what is needed about these evil bots. This, of course, can be brought to the next level training with the right machine learning algorithm and the correct data. It was a wild ride; a conversation that we truly enjoyed. We invite you to join us as Will and Matt take us up and down the rollercoaster of InfoSec. Learn more about Cequence Security on ITSPmagazine here: https://www.itspmagazine.com/company-directory/cequence Learn more about Their Story podcasts here: https://www.itspmagazine.com/their-infosec-story

ITSPmagazine | Technology. Cybersecurity. Society
Their Story Chats At RSAC San Francisco 2019 | Larry Link And Shreyans Mehta, Cequence Security

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 8, 2019 16:56


Integrity is key in today’s hyper connected web-based application world. From social media to financial services, site and application integrity is critical to a platform’s success. Yet, automation is helping the bad guys as well as the good. Sites today are under attack from those who would steal content through automated screen scraping, artificially drive reputation, or leverage stolen credentials to compromise an account to engage in fraudulent activity. With nearly 1/3 of all internet traffic being generated by malicious, automated bots, it’s more important than ever to be able to separate human from bot, malicious from suspicious, to ultimately get in front of and block bot attacks. Mitigating bot attacks used to mean modifying your apps, but even that didn’t protect your APIs, and frankly continued protection requires something more dynamic in nature. In this podcast I’m joined by Larry Link & Shreyans Mehta from Cequence, a silicon valley startup who is applying real-time network analysis, machine learning, threat intelligence, and behavioral analytics to accurately detect and mitigate bot attacks without affecting legitimate user traffic. Since web, mobile, and API application service attacks don’t involve malicious content, it’s often not possible to rely on traditional security tools. Larry and Shreyans help us understand how Cequence focuses its attention on detecting the underlying behavior and intent of each application request, thereby securing modern application infrastructures. Learn more about Cequence Security on ITSPmagazine here: https://www.itspmagazine.com/company-directory/cequence

Paul's Security Weekly
Techniques & Capabilities - Business Security Weekly #115

Paul's Security Weekly

Play Episode Listen Later Feb 1, 2019 48:05


This week, Matt and Paul interview Shreyans Mehta, Chief Technology Officer at Cequence Security to talk about Advanced Bot Protection! In the Leadership and Communications segment, Cybersecurity isn't just for tech people anymore, The Weird Approach to leadership, 4 things to do before a tough conversation, and more!   Full Show Notes: https://wiki.securityweekly.com/BSWEpisode115 Visit https://www.securityweekly.com/bsw for all the latest episodes! To find out more about Cequence Security visit: https://securityweekly.com/cequence   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Advanced Bot Protection, Cequence Security - Business Security Weekly #115

Paul's Security Weekly TV

Play Episode Listen Later Feb 1, 2019 21:56


Shreyans Mehta is the CTO at Cequence Security. Shreyans joins us to talk about advanced bot protection and how Cequence is involved. Full Show Notes: https://wiki.securityweekly.com/BSWEpisode115

business interview cto bsw security weekly cequence security business security weekly shreyansmehta
Business Security Weekly (Video)
Advanced Bot Protection, Cequence Security - Business Security Weekly #115

Business Security Weekly (Video)

Play Episode Listen Later Feb 1, 2019 21:56


Shreyans Mehta is the CTO at Cequence Security. Shreyans joins us to talk about advanced bot protection and how Cequence is involved. Full Show Notes: https://wiki.securityweekly.com/BSWEpisode115

business interview cto bsw security weekly cequence security business security weekly shreyansmehta
Business Security Weekly (Audio)
Techniques & Capabilities - Business Security Weekly #115

Business Security Weekly (Audio)

Play Episode Listen Later Feb 1, 2019 48:05


This week, Matt and Paul interview Shreyans Mehta, Chief Technology Officer at Cequence Security to talk about Advanced Bot Protection! In the Leadership and Communications segment, Cybersecurity isn't just for tech people anymore, The Weird Approach to leadership, 4 things to do before a tough conversation, and more!   Full Show Notes: https://wiki.securityweekly.com/BSWEpisode115 Visit https://www.securityweekly.com/bsw for all the latest episodes! To find out more about Cequence Security visit: https://securityweekly.com/cequence   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly