POPULARITY
In this episode of Partnerships Unraveled, we dive deep into the evolving world of distribution and partner strategy with Patrícia Cabrera Perez, Head of Distribution for EMEA at Gigamon. With over two decades of experience spanning LATAM and EMEA, Patrícia brings a unique, heartfelt perspective on the power of channel partnerships, grounded in trust, strategy, and adaptability.We explore her journey from sending POs via fax machines in Mexico City to orchestrating large-scale channel strategies across Europe. Patrícia shares her insights into the delicate balance between partner volume and value, the frameworks she uses to drive growth, and the art of fostering agility within massive partner ecosystems.This episode also tackles the rising influence of marketing in distribution, how data and personalization are redefining partner engagement, and why demand generation is the often-overlooked metric every channel leader should obsess over. To round it out, Patrícia opens up about the transformative power of mentorship, both received and given and why leading by example can ripple across an entire ecosystem.Whether you're a channel veteran or new to the space, this conversation offers strategic depth, personal warmth, and real-world lessons for anyone looking to scale partnerships with purpose.Connect with Patricia: https://www.linkedin.com/in/patricia-cabrera-perez-80960030/_________________________Learn more about Channext
It was the kind of boardroom moment that separates finance professionals from finance leaders. Tony Jarjoura, now CFO of Gigamon, found himself surrounded by audit committee members as a dense, highly technical tax strategy unraveled before them. Despite having pored over legal memos and internal reviews, the room still looked puzzled—until Tony spoke. In just two sentences, he distilled thousands of hours of technical effort into a clear, accessible takeaway. “That was the moment,” he tells us, “when I realized the power of translating complexity into clarity.”Tony's journey to that moment began with a professor's advice back in university: go Big Four, earn your CPA, and the world will open up. He took it to heart, spending 15 years at Ernst & Young in San Francisco, embedded in Silicon Valley's IPO engine room. At EY, he wasn't just crunching numbers—he was watching ideas travel from whiteboard sketches to billion-dollar listings. Companies like Atlassian, Okta, and Workday became case studies in how finance underpins innovation.When he stepped into industry during the COVID years, Jarjoura traded IPO war rooms for the operational depths of Gigamon. He jokes about never having recorded a journal entry before—but quickly embraced the inner mechanics of finance operations. Today, he views FP&A not as a rearview mirror but as a GPS system for business decision-making. “Finance has to be the connective tissue,” he says, “translating data into decisions that shape where we go next.
Cato Networks, a Climb Channel Solutions vendor, is the leading Secure Access Service Edge provider in the world, having pioneered the cloud-native architecture which is improving online speeds and security while moving away from a reliance on data centres. The company recently announced that it had surpassed $200 million in ARR —doubling ARR in under two years. This means they are the fastest company to reach this milestone since LinkedIn. Cato Networks recently attended a Climb Channel Solutions event in Dublin and I spoke to Mark Draper, EMEA Channel Cato Networks. Mark talks about his background, SASE, the Cato cloud, Gartner and more. More about Mark Draper: Mark Draper is a seasoned professional with extensive experience in channel management across the EMEA and UK&I regions. Currently serving as Vice President of EMEA Channel at Cato Networks, previous positions include Director of EMEA Channel at Cato Networks, Sr Manager of EMEA Channel at Gigamon, and Sr Manager of UK&I Channel at Juniper Networks. Mark also held the role of Channel Lead for UK&I at FireEye, Inc. and was a Partner Account Manager at Juniper Networks, showcasing a strong background in channel strategy and partnership development.
This episode features an interview with Karl Van den Bergh, CMO, Gigamon, a company that helps enable IT organizations to eliminate security blind spots, optimize network traffic and reduce tool costs, enabling them to better secure and manage their hybrid cloud infrastructure. In this episode, Karl talks about shifting from a lead model to a demand unit model, the impact of investing in brand when budgets are tight, and balancing awareness with demand. He also talks about his approach to content, creating something that stands out and that people either love or hate. Key Takeaways:Transitioning from a lead-based model to a demand unit model can better align with complex B2B buying processes because it allows for more accurate targeting of entire buying committees.Maintaining brand investments during economic downturns is a way to seize opportunity to win market share. Companies that continue to invest in brand awareness during tight budgets will emerge stronger when the market recovers.Leveraging humor in campaigns, and embracing that some people will love it and some will hate it, is more memorable and can have better results than content that blends in. Quote: “We said, look, I'd rather put something out there that people either love or hate, as long as it's done, again, it can't be offensive, but people love or hate. I'd rather have something that stands out than something that's bland that no one would object to. And sure enough, as I said, it way outperformed benchmark.”Episode Timestamps: *(04:30) The Trust Tree: Shifting from a lead-based model to a demand unit model *(20:26): The Playbook: Put out content people will love or hate *(38:06) The Dust-Up: Authentic Dialogue*(39:47) Quick Hits: Karl's Quick HitsSponsor:Pipeline Visionaries is brought to you by Qualified.com, the #1 Conversational Marketing platform for companies that use Salesforce and the secret weapon for pipeline pros. The world's leading enterprise brands trust Qualified to instantly meet with buyers, right on their website, and maximize sales pipeline. Visit Qualified.com to learn more.Links:Connect with Ian on LinkedInConnect with Karl on LinkedInLearn more about GigamonLearn more about Caspian Studios
In this episode of The Security Podcasts featuring Chaim Mazal, Chief Security Officer at Gigamon, we discuss the challenges modern day CISOs face with evolving regulatory requirements and compliance standards.
Today we chat with Doug Kay, a self-branded security-minded network engineer with past roles at multiple networking companies.We tackle Doug's career journey from starting as a Novell and Windows administrator, to working at Juniper, Cisco, Gigamon, Nokia, and Arista, in various roles such as pre-sales, post-sales, and government contractor. He shares some of the challenges and opportunities he faced along the way, as well as some of the skills and technologies he learned.Doug talks about how he learned to prioritize his family and hobbies over work, and how he found satisfaction and validation in his post-sales role at Arista. He also mentions some of his hobbies, such as cars and podcasting, and how they helped him cope with stress and connect with his father.Accompany us to this great interview with our friend Doug Kay.-I remember this great quote from somebody at Juniper,He said “erybody has something that they really care aboutin this world that's important…”and I thought he was gonna say work or money.he said Family.-Doug's Link: LinkedInCars Loved (podcast)--Thanks for being an imposter - a part of the Imposter Syndrome Network (ISN)! We'd love it if you connected with us on LinkedIn: https://www.linkedin.com/company/the-imposter-syndrome-network-podcast Make it a great day.
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Some will argue that providing cybersecurity to a federal agency is a balancing game. On the one hand, you must encrypt network traffic; on the other hand, you provide a mechanism where this encrypted traffic is inspected. This must be done in compliance with many regulations and not have any impact on the speed of the network. Sounds easy when a group of software developers are arguing around a white board. However, in the real world this task must be accomplished in a rapidly changing environment in the hybrid cloud. Systems are under attack daily; mountains of unstructured data bombard federal systems on an hourly basis. These factors moves up the level of complexity. Your system must be flexible enough to give you a thorough understanding of network traffic. Some analysts call this “Cryptographic Agility.” Chaim Mazal from Gigamon provides the listeners with an overview of the company, Gigamon. In business since 2014, they currently work with 87% of all Fortune 100 companies. They have recently announced an offering called “Precryption.” It gives federal leaders deeper control of the TLS layer. During the interview, Chaim outlines how Preryption can reduce cost, overhead, and overall resources in an effort at deep inspection of network data. Ian Farquar is a colleague of Chaim's at Gigamon. He has a magnificent phrase that talks about data. He once said, “look at traffic because that is where the truth is.” Deep observability can give federal leasers and foot up on controlling massive amounts of data. Follow John Gilroy on Twitter @RayGilray Follow John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Listen to past episodes of Federal Tech Podcast www.federaltechpodcast.com
In this episode of the Endace Packet Forensics Files, Michael Morris talks with Martyn Crew, Senior Director, Solutions Marketing and Partner Technologies at Gigamon, a 30-year veteran in the cyber security and network management space.Martyn shares his expertise on the limitations and risks associated with exclusively using log and meta-data as the primary resources for your security team's investigations. He discusses various use cases where network traffic and full packet data can play a crucial role in security investigations, highlighting the potential oversights that could occur when teams rely solely on log data.Martyn recommends how to address the scalability challenges of leveraging full-packet data and delves into the storage and retention obstacles that many organizations fear when looking at solution options.Finally, Martyn suggests how to achieve a balance with telemetry sources and costs for your SOC team, and shares some key considerations for maintaining visibility in your hybrid cloud infrastructure - encompassing both on-prem and public or private cloud environments.
In this Risky Business News sponsor interview Tom Uren talks to Ryan Mahoney, Product Director at Gigamon. The TLS 1.3 encryption standard makes passive network monitoring inside your network difficult without break and inspect contortions. But Gigamon has what they call a “precryption” solution!
Renegade Thinkers Unite: #2 Podcast for CMOs & B2B Marketers
This is a Tuesday Tips episode where you will hear host Drew Neisser, CMOs, and other B2B experts share their hard-earned wisdom and fresh marketing insights in a bitesize format. Featuring: Chip Rodgers of WorkSpan, Marca Armstrong of Passport, Bernd Leger of Cornerstone OnDemand, Karl Van den Bergh of Gigamon, Marni Carmichael of ImageSource, and Grant Johnson of Billtrust To see the video versions, follow Drew Neisser on LinkedIn or visit our YouTube channel—The Renegade Marketing Hub! And if you're a B2B CMO, check out our thriving community: https://cmohuddles.com/
Do you know what data your car is collecting about you? Do you think it's right for a car manufacturer to collect a subscription to keep your bottom warm? And just why has YouPorn sent an email to Graham about his sex video?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Host Unknown's Andrew Agnês.Plus don't miss our featured interview with Gigamon's Mark Jow.Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:Yikes! My sex video has been uploaded to YouPorn, apparently - Graham Cluley.1 million YouPorn users exposed; data breach required no security penetration - Computer World article from 2012.The YouPorn Sextortion Email Spam Campaign Explained - MalwareTips.BMW deems drivers worthy of warmth, ends heated car seat subscription - The Register.Hackers crack Tesla software to get free features - The Independent.It's Official: Cars Are the Worst Product Category We Have Ever Reviewed for Privacy - Mozilla Foundation.Car Companies: Stop Your Huge Data Collection Programs - Mozilla Foundation.Programming language inventor or serial killer? - Vole.wtf.Rask - AI video localisation.Verbalate - Video translation and lip sync software.The Following Events Are Based on a Pack of Lies review - The Guardian.The Following Events Are Based on a Pack of Lies - BBC iPlayer.Smashing Security merchandise (t-shirts, mugs, stickers and stuff)Sponsored by:Kolide – Kolide ensures that if your device isn't secure it can't access your cloud apps. It's Device Trust for Okta. Watch the demo today!Gigamon – Download the Gigamon Hybrid Cloud Security Survey to learn about the hidden dangers of encrypted traffic.Drata – With over 14...
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: Why everyone should pay attention to some recent attacks on Okta customers Why third party comms apps are risky af Why are Russian espionage opps using Tor for C2? Surveillance firms abuse Fiji Telco Digicel's SS7 access Much, much more! This week's show is brought to you by Gigamon. Mark Jow, Gigamon's EMEA Technical Director is this week's sponsor guest. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Cross-Tenant Impersonation: Prevention and Detection | Okta Security BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps NCSC-MAR-Infamous-Chisel.pdf Ukraine says an energy facility disrupted a Fancy Bear intrusion Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach – Krebs on Security Telstra-owned Pacific mobile network likely exploited by spies for hire - ABC News CISA, MITRE shore up operational tech networks with adversary emulation platform LogicMonitor customers hit by hackers, because of default passwords | TechCrunch Barracuda thought it drove 0-day hackers out of customers' networks. It was wrong. | Ars Technica Why is .US Being Used to Phish So Many of Us? – Krebs on Security UK cyber agency announces Ollie Whitehouse as its first ever CTO Embattled consulting firm PwC swept up in global cyber breach of file service MOVEit by cybercrime group C10p ONLINE-SCAM-OPERATIONS-2582023.pdf Unmasking Trickbot, One of the World's Top Cybercrime Gangs | WIRED
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: Why everyone should pay attention to some recent attacks on Okta customers Why third party comms apps are risky af Why are Russian espionage opps using Tor for C2? Surveillance firms abuse Fiji Telco Digicel's SS7 access Much, much more! This week's show is brought to you by Gigamon. Mark Jow, Gigamon's EMEA Technical Director is this week's sponsor guest. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Cross-Tenant Impersonation: Prevention and Detection | Okta Security BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps NCSC-MAR-Infamous-Chisel.pdf Ukraine says an energy facility disrupted a Fancy Bear intrusion Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach – Krebs on Security Telstra-owned Pacific mobile network likely exploited by spies for hire - ABC News CISA, MITRE shore up operational tech networks with adversary emulation platform LogicMonitor customers hit by hackers, because of default passwords | TechCrunch Barracuda thought it drove 0-day hackers out of customers' networks. It was wrong. | Ars Technica Why is .US Being Used to Phish So Many of Us? – Krebs on Security UK cyber agency announces Ollie Whitehouse as its first ever CTO Embattled consulting firm PwC swept up in global cyber breach of file service MOVEit by cybercrime group C10p ONLINE-SCAM-OPERATIONS-2582023.pdf Unmasking Trickbot, One of the World's Top Cybercrime Gangs | WIRED
Get Opto's best content every day by subscribing to our FREE Newsletter: www.cmcmarkets.com/en/opto/newsletterToday, we have the pleasure of speaking with Rex Jackson, CFO of ChargePoint, the world's largest electric vehicle (EV) charging network and the first ever to be publicly traded, counting over 48,000 charging stations across the globe.“We want to be everywhere,” says Rex, discussing the company's infrastructure expansion ambitions relying on four pillars: ‘ubiquity, accessibility, usability and reliability.' In the episode, Rex shares insights on the growth trajectory of the EV market, emphasising that the transition to mass adoption could take between 15 and 30 years. Rex also walks us through the firm's revenue stream and profitability target, set for the end of 2024. We conclude with Rex commenting on the recent Tesla Supercharger's network deals and their impact on ChargePoint's future.Before joining ChargePoint in 2018, Rex served as CFO for Gigamon, Rocket Fuel Inc., JDS Uniphase Corp. and Symyx Technologies Inc, and held senior executive positions at leading public and private companies, including Avago (now Broadcom Inc.) and Synopsys.Twitter: @ChargePointnetThanks to Cofruition for consulting on and producing the podcast. Want further Opto insights? Check out our daily newsletter: https://www.cmcmarkets.com/en-gb/opto/newsletter------------------Past performance is not a reliable indicator of future results.CMC Markets is an execution-only service provider. The material (whether or not it states any opinions) is for general information purposes only and does not take into account your personal circumstances or objectives. Nothing in this material is (or should be considered to be) financial, investment, or other advice on which reliance should be placed. No opinion given in the material constitutes a recommendation by CMC Markets or the author that any particular investment, security, transaction, or investment strategy is suitable for any specific person.The material has not been prepared in accordance with legal requirements designed to promote the independence of investment research. Although we are not specifically prevented from dealing before providing this material, we do not seek to take advantage of the material prior to its dissemination.CMC Markets does not endorse or offer opinions on the trading strategies used by the author. Their trading strategies do not guarantee any return and CMC Markets shall not be held responsible for any loss that you may incur, either directly or indirectly, arising from any investment based on any information contained herein for any loss that you may incur, either directly or indirectly, arising from any investment based on any information contained herein.
Today on the Social-Engineer Podcast: The Security Awareness Series, Ryan and I are joined by Jason Rebholz. Jason is the Chief Information Security Officer at Corvus Insurance. He has over a decade of experience performing forensic investigations into sophisticated cyber attacks and helping organizations build secure and resilient environments. As Corvus's CISO, Jason leverages his incident response, security, and infrastructure expertise to drive security strategy and reduce the risk of security threats internally at Corvus and for Corvus's policyholders. Prior to joining Corvus, Jason held leadership roles at Mandiant, The Crypsis Group, Gigamon, and MOXFIVE [June 19, 2023] 00:00 - Intro 01:03 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 05:04 - Jason Rebholz Intro 05:47 - How did you get to where you are? 11:32 - Eating the Elephant 12:53 - The Gospel of Ryan 15:39 - Back to Basics 16:49 - Finding the Right Alleyway 20:32 - You're Allowed to Change Your Mind 23:14 - The Right Tools for the Job 24:58 - Maximizing ROI 25:54 - The City of No 27:11 - What's Bad MFA? 29:41 - 3-2-1...1 32:52 - Quality Fishing 36:32 - Holistic Security Program 39:07 - Realistic Expectations 41:31 - Mentors - Steve Surdu 42:58 - Book Recommendations - Atomic Habits – James Clear 45:16 - Wrap Up - LinkedIn: www.linkedin.com/in/jrebholz/ - Youtube: www.youtube.com/@teachmecyber - Website: www.corvusinsurance.com/ 46:07 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Jason Rebholz's duties at Corvus Insurance extend beyond those of a conventional CISO...Alongside developing the company's internal security framework, Jason runs a threat intel team focused on protecting policyholders and working closley with underwriters to identifying emerging risks. He also works closely with Corvus's Risk + Response team who is focused on delivering risk mitigation expertise into the hands of brokers and policyholders.In this episode, Jason shares his thoughts on cybersecurity today and where it's heading, with topics like:1. Why security awareness training isn't the strongest security measure2. How Corvus Insurance found the sweet spot between underwriting methods and tech3. The top 4 minimum cybersecurity measures all businesses should implement4. The role CISO plays in harmonizing DevOps and IT security5. The impact of the cyber insurance cycle on DFIR qualityAbout Jason:Jason Rebholz is the Chief Information Security Officer at Corvus. He has over a decade of experience performing forensic investigations into sophisticated cyberattacks and helping organizations build secure and resilient environments. As Corvus's CISO, Jason leverages his incident response, security, and infrastructure expertise to drive security strategy and reduce the risk of security threats internally at Corvus and for Corvus's policyholders. Prior to joining Corvus, Jason held leadership roles at Mandiant, The Crypsis Group, Gigamon, and MOXFIVE.Find Jason on LinkedIn: https://www.linkedin.com/in/jrebholz/__________About Corvus Insurance:Corvus Insurance is building a safer world through insurance products and digital tools that reduce risk, increase transparency, and improve resilience for policyholders and program partners. Corvus's market-leading specialty insurance products are enabled by advanced data science and include Smart Cyber Insurance® and Smart Tech E+O™. Corvus's digital platforms and tools enable efficient quoting and binding and proactive risk mitigation. Corvus offers insurance products in the U.S., Middle East, Europe, Canada, and Australia.Website: https://www.corvusinsurance.com/Industry: Artificial Intelligence, Cyber Security, Insurance, InsurTechCompany size: 300Headquarters: Boston, United StatesFounded: 2017__________About the host, Anthony:Anthony is passionate about cyber insurance. He is the CEO of Asceris, a company that enables its clients to respond to cyber incidents quickly and effectively. Anthony is originally from the US but now lives in Europe with his wife and two children.Get in touch with Anthony on LinkedIn: https://www.linkedin.com/in/anthonyhess/ or email: ahess@asceris.com__________This podcast is produced by our friends at SAWOO
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: Joe Sullivan's sentencing MSI key material leak Merck to be paid in NotPetya claim The FBI takes down Turla's Snake malware operation Much, much more This week's show is brought to you by Gigamon. Chaim Mazal, Gigamon's CSO, is this week's sponsor guest. He's talking about how the company's gear is acting as a data source for network security products. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Former Uber CSO avoids prison time for ransomware coverup | Cybersecurity Dive Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders | Cybersecurity Dive Home / Twitter Hunting Russian Intelligence “Snake” Malware | CISA Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia's Federal Security Service | OPA | Department of Justice Iranian state-sponsored hackers exploiting printer vulnerability Iran: Fake It Till You Make It - by Tom Uren Hacktivists Target Iran's Foreign Ministry, Leak Trove Of Data New Cactus ransomware encrypts itself to evade antivirus White House considers ban on ransom payments, with caveats | Cybersecurity Dive Hamas armed wing announces suspension of bitcoin fundraising | Reuters FBI, Ukraine seize cryptocurrency exchanges for abetting cybercriminals Dallas still recovering from ransomware on eve of municipal election | Cybersecurity Dive Dallas restores core emergency dispatch systems | Cybersecurity Dive Hackers hijacked a university's emergency system to threaten students and faculty Organizations slow to patch GoAnywhere MFT vulnerability even after Clop ransomware attacks $10M Is Yours If You Can Get This Guy to Leave Russia – Krebs on Security Coming to DEF CON 31: Hacking AI models | CyberScoop Google Is Rolling Out Passkeys, the Password-Killing Tech, to All Accounts | WIRED US Court Rules for Corellium in Apple Copyright Case SafeGraph Lands US Air Force Contract After Targeting Abortion Clinics | WIRED
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: Joe Sullivan's sentencing MSI key material leak Merck to be paid in NotPetya claim The FBI takes down Turla's Snake malware operation Much, much more This week's show is brought to you by Gigamon. Chaim Mazal, Gigamon's CSO, is this week's sponsor guest. He's talking about how the company's gear is acting as a data source for network security products. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Former Uber CSO avoids prison time for ransomware coverup | Cybersecurity Dive Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders | Cybersecurity Dive Home / Twitter Hunting Russian Intelligence “Snake” Malware | CISA Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia's Federal Security Service | OPA | Department of Justice Iranian state-sponsored hackers exploiting printer vulnerability Iran: Fake It Till You Make It - by Tom Uren Hacktivists Target Iran's Foreign Ministry, Leak Trove Of Data New Cactus ransomware encrypts itself to evade antivirus White House considers ban on ransom payments, with caveats | Cybersecurity Dive Hamas armed wing announces suspension of bitcoin fundraising | Reuters FBI, Ukraine seize cryptocurrency exchanges for abetting cybercriminals Dallas still recovering from ransomware on eve of municipal election | Cybersecurity Dive Dallas restores core emergency dispatch systems | Cybersecurity Dive Hackers hijacked a university's emergency system to threaten students and faculty Organizations slow to patch GoAnywhere MFT vulnerability even after Clop ransomware attacks $10M Is Yours If You Can Get This Guy to Leave Russia – Krebs on Security Coming to DEF CON 31: Hacking AI models | CyberScoop Google Is Rolling Out Passkeys, the Password-Killing Tech, to All Accounts | WIRED US Court Rules for Corellium in Apple Copyright Case SafeGraph Lands US Air Force Contract After Targeting Abortion Clinics | WIRED
Renegade Thinkers Unite: #2 Podcast for CMOs & B2B Marketers
This is a Tuesday Tips episode where you will hear host Drew Neisser, CMOs, and other B2B experts share their hard-earned wisdom and fresh marketing insights in a bitesize format. Featuring: Michael Callahan of Acronis, Itamar Sabo of Gigamon, and Grant Johnson of Billtrust To see the video versions, follow Drew Neisser on LinkedIn or visit our YouTube channel—The Renegade Marketing Hub! And if you're a B2B CMO, check out our thriving community: https://cmohuddles.com/
In this episode of TOP CMO, we're joined by Karl Van den Bergh, the Chief Marketing Officer of cybersecurity leader Gigamon. With a background in deep observability and an impressive tech portfolio, Karl shares his insights on managing a marketing mix during economic downturns and leveraging lessons from the pandemic. We discuss finding the right balance between short-term results and long-term thinking, seizing opportunities during downturns, and building strong relationships with customers, partners, and stakeholders. Tune in to learn from Karl's experience as a CMO on how to stay focused on your objectives and adapt your marketing strategies to thrive in the present while laying a solid foundation for the future.
In this episode of the Endace Packet Forensic files, Michael Morris talks to Jim Mandelbaum, Field CTO at Gigamon, about what “security at scale” means. Jim draws on more than a decade of experience as a CTO in the security industry, and shares best-practise tips to ensure that as your infrastructure evolves, your security posture keeps pace.Jim highlights the importance of leveraging automation to help deal with the increasingly complex network environment. Key to this is having visibility into exactly what's happening on your network – including on-prem, cloud and hybrid-cloud environments – so you can make informed decisions about what traffic needs to be monitored and recorded. And what tasks can be automated to ensure threat visibility. It's also critical to break down team silos, Jim says. Otherwise, responsibility has a tendency to fall through the cracks. Teams need to collaborate closely and include the security team on IT strategy planning - and particularly cloud migration projects. That makes it easier to determine who is responsible for what parts of security from the get-go. When teams have the opportunity to discuss the challenges they face they can often leverage solutions that have been successfully implemented elsewhere in the organization – saving time, resources and budget as a result.Lastly, Jim highlights the importance of talking with your vendors about their future product strategies to ensure they align with your organization's plans. Otherwise, there's a risk of divergence which could prove very costly down the track.
The three subject matter experts in this discussion give the listener a wonderful perspective on challenges and solutions to moving to Zero Trust. The interview revolves around tools needed to audit a network, risks inherent in a hybrid cloud, a why a Zero trust platform gives an agency the flexibility it needs to deploy zero trust effectively. Every discussion about zero trust for government agencies starts with trying to determine what is on your network. Smurti Shah from Michigan notes that tools that commercial organizations can use to accomplish that task may not work in a government environment. Therefore, State and local organizations must select Governance, Risk, and Compliance (GRC) solutions that are permitted. Ian Farquhar from Gigamon brings up a fascinating issue with the “discovery” aspect of network analysis: cognitive bias. For example, a systems administrator may swear on a stack of bibles that they have documented every single item on the network. Ian mentions simple questions like: What about that copier? Does it ever have sensitive documents on it? What about the printer? If your organization allows employees to bring in devices, what kind of security implications does that bring? During the discussion, the concept of “trust” was unpacked. We know that trust applies to “who” and “what,” but what about the system itself? Ian Farquhar applies trust to logging and Cloud Service Providers (CSPs). The Solar Winds event looks like it started with the modification of the logs themselves. If you trust the logs, then you can be vulnerable to attack, one should apply zero trust to log controls. One approach to minimizing vendor lock-in is to use a hybrid cloud. This adds complexity to an already complicated situation. The CSPs certainly do a wonderful job at telling people about the security of their cloud. Be careful to apply controls to that cloud environment, offloading trust to them can put you at risk. All participants agreed that zero trust gives the flexibility to handle attacks today and in the future.
On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Australia lets ASD loose on ransomware crews, but will it work? (Tom Uren joins us to chat about this one) Twitter's wheels haven't fallen off yet but they sure are wobbling Hundreds of millions stolen from FTX mid implosion Security researchers start looking at Mastodon and… yeah Much, much more! This week's show is brought to you by Gigamon. George Sandford from Gigamon pops in for this week's sponsor interview to talk about how to successfully stand up an NDR program. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that's your thing. Show notes Risky Biz News: Australia to hack the hackers Australia to consider banning ransomware payments - The Record by Recorded Future Two enormous cyberattacks convince Australia to 'hack the hackers' - The Washington Post Australian Federal Police say cybercriminals in Russia behind Medibank hack - The Record by Recorded Future The Hunt for the FTX Thieves Has Begun | WIRED US reissues sanctions on Tornado Cash, tying it to North Korea's nuclear weapons program - The Record by Recorded Future Twitter's SMS Two-Factor Authentication Is Melting Down | WIRED Is it safe to use Twitter? Security fears rise after Elon Musk drives off staff Twitter's Security And Privacy Leaders Quit Amidst Musk's Chaotic Takeover FTC tracking developments at Twitter with 'deep concern' after CISO resigns - The Record by Recorded Future Mastodon users vulnerable to password-stealing attacks | The Daily Swig Risky Biz News: Major hack-and-leak info-op unfolding in Moldova All Day DevOps: Third of Log4j downloads still pull vulnerable version despite threat of supply chain attacks | The Daily Swig Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries | Symantec Enterprise Blogs Lenovo driver goof poses security risk for users of 25 notebook models | Ars Technica Cisco: InterPlanetary File System seeing ‘widespread' abuse by hackers - The Record by Recorded Future Project Zero: A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain Google Pixel screen-lock hack earns researcher $70k | The Daily Swig DJ Zavala & DMNTED - Welcome to Ukraine - YouTube
On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Australia lets ASD loose on ransomware crews, but will it work? (Tom Uren joins us to chat about this one) Twitter's wheels haven't fallen off yet but they sure are wobbling Hundreds of millions stolen from FTX mid implosion Security researchers start looking at Mastodon and… yeah Much, much more! This week's show is brought to you by Gigamon. George Sandford from Gigamon pops in for this week's sponsor interview to talk about how to successfully stand up an NDR program. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that's your thing. Show notes Risky Biz News: Australia to hack the hackers Australia to consider banning ransomware payments - The Record by Recorded Future Two enormous cyberattacks convince Australia to 'hack the hackers' - The Washington Post Australian Federal Police say cybercriminals in Russia behind Medibank hack - The Record by Recorded Future The Hunt for the FTX Thieves Has Begun | WIRED US reissues sanctions on Tornado Cash, tying it to North Korea's nuclear weapons program - The Record by Recorded Future Twitter's SMS Two-Factor Authentication Is Melting Down | WIRED Is it safe to use Twitter? Security fears rise after Elon Musk drives off staff Twitter's Security And Privacy Leaders Quit Amidst Musk's Chaotic Takeover FTC tracking developments at Twitter with 'deep concern' after CISO resigns - The Record by Recorded Future Mastodon users vulnerable to password-stealing attacks | The Daily Swig Risky Biz News: Major hack-and-leak info-op unfolding in Moldova All Day DevOps: Third of Log4j downloads still pull vulnerable version despite threat of supply chain attacks | The Daily Swig Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries | Symantec Enterprise Blogs Lenovo driver goof poses security risk for users of 25 notebook models | Ars Technica Cisco: InterPlanetary File System seeing ‘widespread' abuse by hackers - The Record by Recorded Future Project Zero: A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain Google Pixel screen-lock hack earns researcher $70k | The Daily Swig DJ Zavala & DMNTED - Welcome to Ukraine - YouTube
Podcast: Aperture: A Claroty Podcast (LS 23 · TOP 10% what is this?)Episode: Joe Slowik on TRITON Malware, XENOTIME Hacking GroupPub date: 2022-10-28Joe Slowik, threat intelligence and detections lead at Gigamon, joins the podcast to discuss the XENOTIME hacking group, the entity believed to be responsible for the 2017 Triton attack. Triton was deployed within a petrochemical facility in Saudi Arabia and triggered a fault in the Schneider Electric Triconex Safety Instrumented Systems that initiated a shutdown of the plant. The Triton intrusion and malware deployment could have been much worse, resulting in harmful physical consequences and loss of life. Slowik's recent Virus Bulletin paper and presentation describes the complex ecosystem behind XENOTIME, its connections to Russian intelligence, and the tooling it built enabling the Triton attack and deployment.One question does linger: Who wrote Triton? The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Joe Slowik, threat intelligence and detections lead at Gigamon, joins the podcast to discuss the XENOTIME hacking group, the entity believed to be responsible for the 2017 Triton attack. Triton was deployed within a petrochemical facility in Saudi Arabia and triggered a fault in the Schneider Electric Triconex Safety Instrumented Systems that initiated a shutdown of the plant. The Triton intrusion and malware deployment could have been much worse, resulting in harmful physical consequences and loss of life. Slowik's recent Virus Bulletin paper and presentation describes the complex ecosystem behind XENOTIME, its connections to Russian intelligence, and the tooling it built enabling the Triton attack and deployment.One question does linger: Who wrote Triton?
Ocient was founded to develop an analytic data platform to enable interactive analytics on datasets of hundreds of billions of rows or more, computing up to trillions of rows per second. Data Lakes have become a popular approach for storing large volumes of structured data. Research shows that almost 3/4 of organizations are using both data lakes and warehouses. Target industries for Ocient include AdTech, Financial Services, Geospatial, Government, Operational IT, and Telecommunications. Existing customers include digital advertising company, Basis Technologies, AdTech provider, MediaMath, Network level intelligence provider, Gigamon, and many others. Dylan talks to Co-founder and CEO, Chris Gladwin, about the present and future of his remarkable company.Have a look at ocient.com!
Ocient was founded to develop an analytic data platform to enable interactive analytics on datasets of hundreds of billions of rows or more, computing up to trillions of rows per second. Data Lakes have become a popular approach for storing large volumes of structured data. Research shows that almost 3/4 of organizations are using both data lakes and warehouses. Target industries for Ocient include AdTech, Financial Services, Geospatial, Government, Operational IT, and Telecommunications. Existing customers include digital advertising company, Basis Technologies, AdTech provider, MediaMath, Network level intelligence provider, Gigamon, and many others. Dylan talks to Co-founder and CEO, Chris Gladwin, about the present and future of his remarkable company.Have a look at ocient.com!
For those tasked with delivering unwavering performance of their apps and data, there have never been more unknowns to account for and manage. That's because today's hybrid clouds and mixed-network environments come with a multitude of dynamic variables -- and an unprecedented degree of complexity. Yet modern digital business demands that the entire constellation of these far-flung cloud services, resources, and application constituent parts coalesce perfectly. The end result must be real-time and always-on user experiences that delight, and business transactions that are both highly secure and never fail. Bridging the gap between such daunting complexity and awesome performance and security requirements means gaining the best visibility into all aspects of the hybrid- and multi-cloud continuum. Subscribe to the podcast on iTunes. Read a full transcript or download a copy. Watch the video. Stay with us as BriefingsDirect explores the ways that deep observability moves past the limitations of metrics, events, logs, and traces to deliver far richer and faster data-driven insights. By exploiting these new means of pervasive deep observability, the highest levels of security, performance, and agility can be attained by nearly any business and organization. To learn how, please welcome Bassam Khan, Vice-President of Product and Technical Marketing Engineering at Gigamon. The interview is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions. Subscribe to the podcast on iTunes. Read a full transcript or download a copy. View the video. Sponsor: Gigamon.
The growing prevalence of complex multi- and hybrid-cloud environments has opened a Pandora's Box of unseen risks around security and performance. But unlike when IT and network operators had the tools and access to track their own internal systems and data, the mixed-cloud model of today is much harder to know and secure. Pandora's Box is open but observing what's going on in and around it is cloaked by inadequate means to gain actionable insights amid all the distributed variables. Enter deep observability and its capabilities, which are designed to provide rich access to multi-cloud and mixed-network behaviors. Such observations and data gathering can be analyzed to rapidly secure end-to-end applications and protect sensitive data. Stay with BriefingsDirect as we explore the latest advances around deep observability, and show how a neutral deployment approach for observation technology spans more infrastructure and services to best protect and accelerate digital business success. Subscribe to the podcast on iTunes. Read a full transcript or download a copy. To learn how deep observability puts cloud chaos and hard-to-know risks back under control, BriefingsDirect welcomes Shane Buckley, President and CEO of Gigamon. The discussion is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions. Subscribe to the podcast on iTunes. Read a full transcript or download a copy. Sponsor: Gigamon.
In Episode 22 of Tattoos, Code, and Data Flows, Matt Rose interviews Jason Rebholz, the Chief Information Security Officer at Corvus Jason has over a decade of experience performing forensic investigations into sophisticated cyber attacks and helping organizations build secure and resilient environments. As Corvus's CISO, Jason leverages his incident response, security, and infrastructure expertise to drive security strategy and reduce the risk of security threats internally at Corvus and for Corvus's policyholders. Prior to joining Corvus, Jason held leadership roles at Mandiant, The Crypsis Group, Gigamon, and MOXFIVE. Jason and Matt talk about: ↳ Assessing the risk of companies at scale in cyber insurance ↳ Must have technology stack for businesses ↳ Path to/responsibilities of becoming a successful CISO ↳ Application & Cloud Security Posture Management And so much more. Be sure to listen to this episode, and so many of our other great episodes by hitting the follow button. Make sure to like and subscribe to the episode. We hope you enjoy it!
Uber may not face prosecution over its handling of a 2016 data breach - but its former chief security head does; how to defend your digital devices' data while on vacation, and how to change your accent with artificial intelligence. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin. Plus don't miss our featured interview with Ian Farquhar of Gigamon. Visit https://www.smashingsecurity.com/285 to check out this episode's show notes and episode links. Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security subreddit, or visit our website for more episodes. Remember: Follow us on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening! Warning: This podcast may contain nuts, adult themes, and rude language. Theme tune: "Vinyl Memories" by Mikael Manvelyan. Assorted sound effects: AudioBlocks. Special Guests: Ian Farquhar and Paul Ducklin.
Uber may not face prosecution over its handling of a 2016 data breach - but its former chief security head does; how to defend your digital devices' data while on vacation, and how to change your accent with artificial intelligence. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans https://www.smashingsecurity.com/hosts/graham-cluley (Graham Cluley) and https://www.smashingsecurity.com/hosts/carole-theriault (Carole Theriault), joined this week by Naked Security's Paul Ducklin. Plus don't miss our featured interview with Ian Farquhar of Gigamon. Warning: This podcast may contain nuts, adult themes, and rude language. Theme tune: "Vinyl Memories" by Mikael Manvelyan. Assorted sound effects: AudioBlocks. Episode links: https://www.justice.gov/usao-ndca/pr/uber-enters-non-prosecution-agreement (Uber Enters Non-Prosecution Agreement Related to 2016 Data Breach ) — US Department of Justice. https://www.bloomberg.com/news/articles/2022-06-28/uber-former-security-chief-must-face-fraud-charges-judge-rules (Former Uber Security Chief Joe Sullivan Must Face Driver Fraud Charges ) — Bloomberg. https://techcrunch.com/2018/09/26/uber-to-pay-148-million-in-data-breach-settlement/ (Uber to pay $148 million in data breach settlement ) — TechCrunch. https://grahamcluley.com/uber-hackers-paid-data-breach/ (Uber paid hackers $100,000 to keep data breach quiet) — Graham Cluley. https://www.csoonline.com/article/3660560/uber-cisos-trial-underscores-the-importance-of-truth-transparency-and-trust.html (Uber CISO's trial underscores the importance of truth, transparency, and trust ) — CSO Online. https://nakedsecurity.sophos.com/2022/07/15/7-cybersecurity-tips-for-your-summer-vacation/ (7 cybersecurity tips for your summer vacation!) — Naked Security. https://www.sanas.ai/demo (Sanas demo.) https://www.prnewswire.com/news-releases/sanas-raises-32m-for-breakthrough-ai-technology-for-real-time-accent-translation-301572710.html (Sanas Raises $32M for Breakthrough AI Technology for Real-Time Accent Translation) — Sanas press release. https://spectrum.ieee.org/ai-accent-translator (This 6-Million-Dollar AI Changes Accents as You Speak) — IEEE Spectrum. https://www.newscientist.com/article/2288976-call-centre-workers-can-use-ai-to-mimic-your-accent-on-the-phone/ (Call centre workers can use AI to mimic your accent on the phone) — New Scientist. https://www.computerworld.com/article/2548265/a-little-less-accent--a-little-more-customer-service.html (A little less accent, a little more customer service ) — ComputerWorld. https://accentadvisor.com/what-is-accent-reduction/ (What Is Accent Reduction? ) — Accent Advisor. https://colinmorris.github.io/blog/compound-curse-words (Compound pejoratives on Reddit – from 'buttface' to 'wankpuffin') — Colin Morris. https://en.wikipedia.org/wiki/Melissa_(computer_virus) (Melissa computer virus) — Wikipedia. https://www.dedhamhall.co.uk/ (Dedham Hall.) https://poly.cam/capture/42434A6D-7BAB-4CAC-9059-73E914D703CA (3D capture of Carole Theriault) — Polycam. https://www.smashingsecurity.com/store (Smashing Security merchandise (t-shirts, mugs, stickers and stuff)) Sponsored by: https://bitwarden.com/smashing/ (Bitwarden)– Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing. https://www.smashingsecurity.com/solcyber (SolCyber) – SolCyber delivers Fortune 500 level cybersecurity for small and medium-sized enterprises. If the bad guys aren't being discriminating about who they're attacking, how can you settle for anything less? https://www.gigamon.com/smashing (Gigamon) - Gigamon's latest report into the state of ransomware. Support the show: You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on...
On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Paige Thompson guilty of Capital One hack Microsoft is hiding serious Azure security issues New Australian government lobbying for Julian Assange How to ransomware documents in the cloud Microsoft stops Windows 10/11 downloads in Russia Belarusian cyber partisans obtain spy agency's audio recordings Much, much more This week's edition of the show is brought to you by Gigamon. Josh Day, Gigamon's Director of applied threat research team, will be along in this week's sponsor interview to talk about detecting badness on your network in encrypted traffic. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that's your thing. Show notes Former Seattle tech worker convicted of wire fraud and computer intrusions | USAO-WDWA | Department of Justice MPs back quiet diplomacy in Assange case Botched and silent patches from Microsoft put customers at risk, critics say | Ars Technica Microsoft's Vulnerability Practices Put Customers At Risk | LinkedIn Security firm warns of ransomware attacks targeting Microsoft cloud 'versioning' feature - The Record by Recorded Future Separate Fujitsu cloud storage vulnerabilities could enable attackers to destroy virtual backups | The Daily Swig Large supermarket chain in southern Africa hit with ransomware - The Record by Recorded Future Telegram: Contact @tass_agency Microsoft pulls Windows 10 and 11 in Russia • The Register DDoS Attacks Delay Putin Speech at Russian Economic Forum Russia warns of a “military clash” if it's hit by US cyberattacks - The Record by Recorded Future Belarusian hacktivist group releases purported Belarusian wiretapped audio of Russian embassy U.S. defense firm L3Harris in talks with NSO Group over spyware - The Washington Post Srsly Risky Biz: Friday June 17 - by Tom Uren Suspect in hacking Russian customs detained in Moscow String of attacks on French telecom infrastructure preceded April attack on fiber optic cables Chinese APT groups targeting India, Pakistan and more with Sophos firewall vulnerability - The Record by Recorded Future Ukrainian cybersecurity officials disclose two new hacking campaigns Police Linked to Hacking Campaign to Frame Indian Activists | WIRED INTERPOL raids hundreds of scammy call centers in sweep A Twitch Streamer Is Exposing Coronavirus Scams Live | WIRED Ranking The World's Angriest Scammers - 10/10 Rage - YouTube MIT researchers find new hardware vulnerability in the Apple M1 chip - The Record by Recorded Future A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys | Ars Technica Tornado Cash Is Crypto Hackers' Favorite Way to Cash Out, But Experts Say It Can Be Traced How CISA's list of 'must-patch' vulnerabilities has expanded both in size, and who's using it The tale of a whale who took Solend's money – Amy Castor
Karl Van den Bergh is Chief Marketing Officer of Gigamon and is responsible for global awareness and demand for the Gigamon solution portfolio. Throughout his 20+ plus-year career, Karl has held go-to-market and product leadership roles in $1B+ tech companies as well as working as part of the executive team at early-stage startups. Connect Karl Van den Bergh | Follow us on LinkedIn
This week's Network Break dives into a trio of acquisitions by Juniper, Intel, and Akamai; new security features from Gigamon and Aviatrix; big financial gains for Arista; and more tech news.
This week's Network Break dives into a trio of acquisitions by Juniper, Intel, and Akamai; new security features from Gigamon and Aviatrix; big financial gains for Arista; and more tech news.
This week's Network Break dives into a trio of acquisitions by Juniper, Intel, and Akamai; new security features from Gigamon and Aviatrix; big financial gains for Arista; and more tech news.
The self-leadership principles of being a work in progress Leadership development expert Mike Normant is the founder of Coach Your Self Up and a big believer in identifying and re-writing the self-limiting stories we tell ourselves. A certified engineer who pivoted into the L&D and HR space, Mike's own journey of confronting his beliefs and the resulting behaviours inspired him to create programs and resources to help people boost their self-awareness. Mike shares his self-leadership insights and explains why we need to take a step up the ‘experimental staircase' to reach our potential. Why you should listen: cultivate a learning leadership mindset The importance of scaling leadership development Why leaders need more people stuff skills Approaching leadership growth as an experiment We explore the leadership responsibilities of self-development Limiting leadership behaviour patterns Incremental leadership development The filters that blur our leadership perspectives
Gigamon adds a human touch to a new SaaS NDR offering, the IEEE finalizes 802.3cu for faster speeds over single-mode optical fiber, US service providers roll out managed SASE services, and more IT news in this week's Network Break podcast.
Gigamon adds a human touch to a new SaaS NDR offering, the IEEE finalizes 802.3cu for faster speeds over single-mode optical fiber, US service providers roll out managed SASE services, and more IT news in this week's Network Break podcast.
Gigamon adds a human touch to a new SaaS NDR offering, the IEEE finalizes 802.3cu for faster speeds over single-mode optical fiber, US service providers roll out managed SASE services, and more IT news in this week's Network Break podcast.
This week's Network Break discusses new ASICs from Cisco, new metadata fields in AWS VPC flow logs, a cloud visibility fabric from packet broker specialist Gigamon, lessons from a data center fire, and more tech news.
This week's Network Break discusses new ASICs from Cisco, new metadata fields in AWS VPC flow logs, a cloud visibility fabric from packet broker specialist Gigamon, lessons from a data center fire, and more tech news.
This week's Network Break discusses new ASICs from Cisco, new metadata fields in AWS VPC flow logs, a cloud visibility fabric from packet broker specialist Gigamon, lessons from a data center fire, and more tech news.
Martyn Crew joins host Dr. Bob Kaiser for a discussion about 5G — the latest technology standard for broadband cellular networks — and its implication for the healthcare industry. Crew is director of solutions marketing for Gigamon, a Silicon Valley-based technology vendor that counts healthcare providers among its clients.
The latest Network Break covers Fortinet's acquisition of endpoint security company EnSilo, digs into Gigamon's new network detection and response product, covers Extreme Networks' launch of ExtremeCloud IQ, reports on the latest tech financial results, and more.
The latest Network Break covers Fortinet's acquisition of endpoint security company EnSilo, digs into Gigamon's new network detection and response product, covers Extreme Networks' launch of ExtremeCloud IQ, reports on the latest tech financial results, and more.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
XML External Entity Vuln in LSP4XML Affects Various Developer Tools https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/?preview=true Google Chrome Will Make "SameSite" Default https://blog.chromium.org/2019/10/developers-get-ready-for-new.html Leftover Gigamon Configurations https://isc.sans.edu/forums/diary/Your+Supply+Chain+Doesnt+End+At+Receiving+How+Do+You+Decommission+Network+Equipment/25448/
On today's Network Break podcast, Google is the latest tech giant to face a tech backlash as U.S. Attorneys General launch an antitrust investigation, AT&T comes under fire from an activist investor, Microsoft partners with satellite broadband providers on ExpressRoute, Gigamon rolls out new software, and more tech news.