Podcast appearances and mentions of jack danahy

  • 6PODCASTS
  • 9EPISODES
  • 24mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 7, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about jack danahy

Latest podcast episodes about jack danahy

Pwned: The Information Security Podcast
Episode 167 – Cybersecurity Seat – Half-full/Half-empty, Have Patience

Pwned: The Information Security Podcast

Play Episode Listen Later Feb 7, 2023 15:46


Following a listener request, Justin Fimlaid and Jack Danahy are talking about successful paths forward when a CISO finds themselves in a role that's a little larger than they expected, or an organization has a well-meaning CISO that needs a little more time to get it right. This happens all the time, and it doesn't have to end with burning out or throwing out an otherwise capable executive. If you find yourself in that oversized chair, sit back and give a listen. Helpful links: The Hunt for the Super CISO Part 1 The Hunt for the Super CISO Part 2 CISO Job Description Download Check out this week's video:   Check out NuHarbor Security for complete cyber security protection for your business and a security partner you can trust. Website: https://nuharborsecurity.com Facebook: https://www.facebook.com/nuharbor/ Twitter: https://twitter.com/NuHarbor@nuharbor LinkedIn: https://www.linkedin.com/company/nuharbor/ Instagram: https://www.instagram.com/nuharborsecurity/

Podcasts – TechSpective
Jack Danahy Discusses Why “Cybersecurity-as-a-Service” Makes the Most Sense

Podcasts – TechSpective

Play Episode Listen Later May 24, 2021 47:36


TechSpective Podcast Episode 060 Jack Danahy joined me for this episode of the TechSpective Podcast. I had the opportunity to work with and for Jack during our time together at Alert Logic, which acquired Barkly, a company he had co-founded. Prior to Barkly, Jack had been involved in launching other successful cybersecurity startups. Currently, he [...] The post Jack Danahy Discusses Why “Cybersecurity-as-a-Service” Makes the Most Sense appeared first on TechSpective.

AVANT Technology Insights with Ken Presti
IT Security Roundtable Part One

AVANT Technology Insights with Ken Presti

Play Episode Listen Later Apr 29, 2020 35:28


Defenses against phishing a ransomware factor HUGELY In Part One of our special panel discussion, based on the AVANT 6-12 Report on IT Security. Join AVANT's Ken Presti with Jack Danahy of AlertLogic, Leo Taddeo of the Cyxtera Federal Group and Ray Watson of Masergy for a lively discussion.

AVANT Technology Insights with Ken Presti
IT Security 6-12 Roundtable Part Two

AVANT Technology Insights with Ken Presti

Play Episode Listen Later Apr 29, 2020 26:27


Fast cars can go faster because they have good brakes!  Find out what that has to do with IT security in Part Two of my panel discussion with Jack Danahy of AlertLogic, Leo Taddeo of the Cyxtera Federal Group, and Ray Watson of Masergy. We also talk about securing home networks (and related liability), credential theft, and a whole lot more.

The CyberWire
Power grids, accidents, the challenge of forensics, and the nature of deterrence. BlueKeep considerations. Third- and fourth-party risks.

The CyberWire

Play Episode Listen Later Jun 18, 2019 20:08


Investigation into Argentina’s power failure continues, with preliminary indications suggesting “operational and design errors were responsible for the outage. Russia reacts to reports that the US staged malware in its power grid. Iran says it stopped US cyberespionage. ISIS worries about its vulnerability to BlueKeep. A breach at EatStreet illustrates some of the features of third-party risk. Ben Yelin from UMD CHHS on a Virginia license plate reader ban. Guest is Jack Danahy from Alert Logic on the troubling issue of adversary dwell time and the IT vigilance gap. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_18.html  Support our show  

FightRansomware Podcast
Is a ransomware attack the perfect crime?

FightRansomware Podcast

Play Episode Listen Later Aug 31, 2017 32:40


Ransomware attacks are inexpensive to launch, profitable and the perpetrator almost never gets caught. That means ransomware is the perfect crime and it's not going to go away anytime soon, according to Jack Danahy, the co-founder and CTO of endpoint security firm Barkly. The good news is that through a combination of technology, education and training, businesses can keep their important data safe. In this installment of the FightRansomware Podcast, Danahy talks about the latest advances fueling powerful ransomware variants like WannaCry. He also explains why everyone in the IT industry -- not just end users -- should get trained regularly on how to defend against ransomware. Listen to the podcast now to learn more.

IBM Rational software podcast series
Trust and transparency: Managing secure outsourced relationships

IBM Rational software podcast series

Play Episode Listen Later Jul 7, 2010 13:43


Security has always hung upon, or been hung by, its weakest link. The complexity of today's systems has compounded the difficulty of defending them, not just because of the number of components, but because of the many sources from which they are drawn. Whether you are integrating an outsourced or opensourced application, or if you are interfacing with an outsourced service provider, security must be one of the areas where there is clear focus and detailed requirements. In this podcast, Jack Danahy, Worldwide Security Executive for Rational, talks about some recent events where more security transparency would have helped, and describes ways in which Rational can help to ensure the security and reputations of our clients.

IBM Rational software podcast series
Removing insecurity from outsourced development

IBM Rational software podcast series

Play Episode Listen Later Jan 3, 2010 12:15


Especially in tough economic times or where resources with requisite security skills are few, companies turn towards outsourcing for software development. Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code. Not only should outsourcers be held to a specific standard for quality but also a standard for security thresholds so that recipients of the final application can be assured that the code vulnerabilities are reduced and risk mitigated. Learn how to set expectations and communicate effectively with your outsourced partners. Learn why even though an application performs as it is intended, there could be inherent vulnerabilities buried in the code that leaves the application at risk. Learn how you can develop processes that ensure that in-house, outsourced or legacy applications can be held to the same standard of security excellence and best practices.

IBM Rational software podcast series
What, Why and How of Application Security

IBM Rational software podcast series

Play Episode Listen Later Dec 24, 2009 15:08


Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach. Don't wait to learn how an application security strategy and policy can mitigate risk and thus safeguard not only your companys informational assets but also your bottom line and brand.