POPULARITY
Dave Cundiff: CylanceGUARDian of the Galaxy If you are responsible for preventing a cyber attack on your organization… What is the ultimate dilemma for this person that is trying to combat threats 24/7? This week on DirtySecurity, Edward Preston has a chat with Dave Cundiff on BlackBerrey Cylance’s newest addition to the security family: CylanceGUARD. Take a walk with Edward and Dave to learn more about what BlackBerry Cylance is doing to combine our solutions and services to continue to prevent cyberattacks from crippling your business. About Dave Cundiff Dave Cundiff is the Director of Professional Services, specializing in ThreatZERO at BlackBerry Cylance. He is an experienced Information Technology Professional with background in a number of industries, including manufacturing, software, and utilities. Have worked as a Manager, Consultant, and Analyst with an inclusive focus in Microsoft and Unix based technologies. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. s Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
CylancePROTECT now available on AWS marketplace, Attivo Networks enhances deception platform with Forensic Collection, Cyber Security market will reach $365.26B by 2026, and Elevate Security raises $8M in Series A! Full Show Notes: https://wiki.securityweekly.com/ES_Episode127 Visit http://securityweekly.com/esw for all the latest episodes!
CylancePROTECT now available on AWS marketplace, Attivo Networks enhances deception platform with Forensic Collection, Cyber Security market will reach $365.26B by 2026, and Elevate Security raises $8M in Series A! Full Show Notes: https://wiki.securityweekly.com/ES_Episode127 Visit http://securityweekly.com/esw for all the latest episodes!
This week, we interview Cody Cornell, Founder and CEO at Swimlane to discuss Security Orchestration, Automation, and Response! In the Enterprise Security News, CylancePROTECT now available on AWS Marketplace, Attivo Networks enhances deception platform with forensic collection, cyber security market will reach $365.26 billion dollars by 2026, and Elevate Security raises 8 million dollars in Series A! Full Show Notes: https://wiki.securityweekly.com/ES_Episode127 Visit http://securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we interview Cody Cornell, Founder and CEO at Swimlane to discuss Security Orchestration, Automation, and Response! In the Enterprise Security News, CylancePROTECT now available on AWS Marketplace, Attivo Networks enhances deception platform with forensic collection, cyber security market will reach $365.26 billion dollars by 2026, and Elevate Security raises 8 million dollars in Series A! Full Show Notes: https://wiki.securityweekly.com/ES_Episode127 Visit http://securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Doris Yang: It Takes a Village to Raise a Security Solution “Trust the process” -- Several people associated with the Philadelphia 76ers Most of you are probably aware that developing, testing and releasing a successful and useful software is not a one person job. There may be a visionary who sparks the initial idea, but there is an, at times, arduous process to develop the idea, write the code, test the solution and get it to market in a timeframe that makes it useful to its target market. We all know the role that developers and engineers play in this process, but we may not be as educated on a team who plays a key role… Product Management. On this week’s episode of DirtySecurity, guest host Matt Stephenson chats with Cylance Senior Director of Product Management Doris Yang. Doris explains what it means to be a Product Manager and the role PM plays in the development process. She also digs into Cylance’s Product Management process as well as the role AI can play in the future. About Doris Yang Doris Yangis a Senior Director of Product Management at Cylance where she plays a pivotal role in defining the development and evolution of the CylancePROTECT solution. Before joining Cylance, Doris held senior product management and engineering positions at Vectra Networks, Palo Alto Networks and Symantec. It’s safe to say she has a pretty good idea of how to bring a good security solution to market. About Matt Stephenson (Fill in) DirtySecurity host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come About Edward Preston Edward didn’t host this episode, but this is his show, so we need to make sure you know what’s up. Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
InSecurity Podcast: Jeff Tang is Beggin’ You… Stop Trying to Make “Weaponized” Cyber Happen The Missing Persons tried to tell usin the 1980s… “Media overload bombarding you with action It's getting near impossible to cause distraction Someone answer me before I pull out the plug What are words for when no one listens anymore” When it comes to cybersecurity, who is telling you the right things? And we don’t mean who is telling you the truth. We mean who is using the right words to describe the things and the actions that are affecting you and your ability to protect your data. Everywhere Jeff Tang looks, he is besieged with news stories using terms like “weapons-grade exploits” to describe the latest malware outbreak. The narrative constructed that results from this colorful language is detrimental to the progress of securing our computer networks, because it seeks to categorically apply the metaphor of military conflict to cybersecurity - and not every incident in cyber conflict qualifies as a military-style “attack.” In today’s episode of InSecurity, Matt Stephenson chats with Cylance Executive Mischief Consultant Jeff Tang about the value of words in cybersecurity. Jeff explains why it is mind boggling to compare the inconvenience of not being able to access your social media or online banking to a real-world kinetic attack that causes mass human causalities. Join us and understand that, while computers work in a world of binaries, that doesn’t mean our thinking about them has to be binary as well. It’s time we transition away from these military terms when discussing cybersecurity – or face the real-world consequences. About Jeff Tang Jeff Tang(@mrjefftang) is a Senior Security Researcher at Cylance focused on operating systems and vulnerability research. He started his career as a Global Network Exploitation & Vulnerability Analyst at the National Security Agency, where he conducted computer network exploitation operations in support of national security requirements. Prior to Cylance, Jeff served as the Chief Scientist at VAHNA to develop a security platform for identifying targeted network intrusions, and also worked as a CNO Developer at ManTech where he researched tools, techniques and countermeasures in computer network vulnerabilities. Jeff completed his Bachelor of Science (BSc) in Electrical Engineering and Computer Science at the University of California, Berkeley and a Master of Science (MSc) in Offensive Computer Security at Eastern Michigan University. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Tales from Cylance’s Ultimate Road Warrior Road Shows and Lunch & Learns and Meet & Greets OH MY! For the past 3 years, Richard Melick has traveled all over the world bringing Cylance’s prevention-based endpoint protection to the masses. From the Unbelievable Tour to the UNDRWRLD Tour and beyond, Richard has created 0-Day malware and ransomware in front of thousands of people, then challenged CylancePROTECT to prevent those 0-Days from executing… all live in front of a an audience. There was no safety net. There was no chance to make a second first impression. These events were more than just marketing though. Richard was there to inform and educate his guests on the perils of Ransomware-as-a-Service. Sometimes, there were even headline grabbing events like WannaCry and Petya/NotPetya. In this week’s episode of DirtySecurity, Edward Preston chats with Cylance’s world traveler about the evolution of their live road shows. Find out what we’ve learned from the past, what we’re doing in the present and Cylance’s plans for the future. About Richard Melick Richard Melick(@RCMelick) has over a decade of experience in Cybersecurity and Antivirus Software. Working in various career functions in the industry that have taken him all over the world. His focus is emerging next generation Cybersecurity and Antivirus Software About Edward Preston Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
From Amazon Echo to self-driving cars to Norman, the Psychopathic AI… the Artificial Intelligence diaspora appears to be growing as diverse as humanity itself. Are we good with that? Susan Etlinger joins Matt Stephenson on the InSecurity podcast to dig into the business ramifications of the ever-increasing presence Artificial Intelligence in the data center. Susan is an industry analyst focusing on industry trends related to the impact of emerging technologies on organizations and individuals. Susan specializes in business strategies related to artificial intelligence, data science, analytics and digital ethics. In this episode of Insecurity, Susan calms Matt's irrational fears of the potential of AI while illuminating the exciting present and future of Artificial Intelligence and Machine Learning. We'll take a look at what is happening in "The Enterprise" and why AI experiments like Microsoft's Tay and MIT's Norman can provide value. Given that Susan was recently named among 100 #AI Influencersby US AI, she is among the most qualified among us to lead this conversation. About Susan Etlinger Susan Etlinger(@setlinger), an industry analyst at Altimeter Group, is a globally recognized expert in digital strategy, with a focus on artificial intelligence, big data, AI ethics and big data. Susan conducts independent research and has authored many reports that are available to the public. Susan works with Global 2000 clients to assess the impact of AI and related technologies on business, and identify use cases, opportunities, risks and organizational structure and culture. She also works with technology vendors to refine product road maps and strategies based on her independent research. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste