POPULARITY
Following a listener request, Justin Fimlaid and Jack Danahy are talking about successful paths forward when a CISO finds themselves in a role that's a little larger than they expected, or an organization has a well-meaning CISO that needs a little more time to get it right. This happens all the time, and it doesn't have to end with burning out or throwing out an otherwise capable executive. If you find yourself in that oversized chair, sit back and give a listen. Helpful links: The Hunt for the Super CISO Part 1 The Hunt for the Super CISO Part 2 CISO Job Description Download Check out this week's video: Check out NuHarbor Security for complete cyber security protection for your business and a security partner you can trust. Website: https://nuharborsecurity.com Facebook: https://www.facebook.com/nuharbor/ Twitter: https://twitter.com/NuHarbor@nuharbor LinkedIn: https://www.linkedin.com/company/nuharbor/ Instagram: https://www.instagram.com/nuharborsecurity/
TechSpective Podcast Episode 060 Jack Danahy joined me for this episode of the TechSpective Podcast. I had the opportunity to work with and for Jack during our time together at Alert Logic, which acquired Barkly, a company he had co-founded. Prior to Barkly, Jack had been involved in launching other successful cybersecurity startups. Currently, he [...] The post Jack Danahy Discusses Why “Cybersecurity-as-a-Service” Makes the Most Sense appeared first on TechSpective.
Defenses against phishing a ransomware factor HUGELY In Part One of our special panel discussion, based on the AVANT 6-12 Report on IT Security. Join AVANT's Ken Presti with Jack Danahy of AlertLogic, Leo Taddeo of the Cyxtera Federal Group and Ray Watson of Masergy for a lively discussion.
Fast cars can go faster because they have good brakes! Find out what that has to do with IT security in Part Two of my panel discussion with Jack Danahy of AlertLogic, Leo Taddeo of the Cyxtera Federal Group, and Ray Watson of Masergy. We also talk about securing home networks (and related liability), credential theft, and a whole lot more.
Investigation into Argentina’s power failure continues, with preliminary indications suggesting “operational and design errors were responsible for the outage. Russia reacts to reports that the US staged malware in its power grid. Iran says it stopped US cyberespionage. ISIS worries about its vulnerability to BlueKeep. A breach at EatStreet illustrates some of the features of third-party risk. Ben Yelin from UMD CHHS on a Virginia license plate reader ban. Guest is Jack Danahy from Alert Logic on the troubling issue of adversary dwell time and the IT vigilance gap. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_18.html Support our show
Ransomware attacks are inexpensive to launch, profitable and the perpetrator almost never gets caught. That means ransomware is the perfect crime and it's not going to go away anytime soon, according to Jack Danahy, the co-founder and CTO of endpoint security firm Barkly. The good news is that through a combination of technology, education and training, businesses can keep their important data safe. In this installment of the FightRansomware Podcast, Danahy talks about the latest advances fueling powerful ransomware variants like WannaCry. He also explains why everyone in the IT industry -- not just end users -- should get trained regularly on how to defend against ransomware. Listen to the podcast now to learn more.
Security has always hung upon, or been hung by, its weakest link. The complexity of today's systems has compounded the difficulty of defending them, not just because of the number of components, but because of the many sources from which they are drawn. Whether you are integrating an outsourced or opensourced application, or if you are interfacing with an outsourced service provider, security must be one of the areas where there is clear focus and detailed requirements. In this podcast, Jack Danahy, Worldwide Security Executive for Rational, talks about some recent events where more security transparency would have helped, and describes ways in which Rational can help to ensure the security and reputations of our clients.
Especially in tough economic times or where resources with requisite security skills are few, companies turn towards outsourcing for software development. Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code. Not only should outsourcers be held to a specific standard for quality but also a standard for security thresholds so that recipients of the final application can be assured that the code vulnerabilities are reduced and risk mitigated. Learn how to set expectations and communicate effectively with your outsourced partners. Learn why even though an application performs as it is intended, there could be inherent vulnerabilities buried in the code that leaves the application at risk. Learn how you can develop processes that ensure that in-house, outsourced or legacy applications can be held to the same standard of security excellence and best practices.
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach. Don't wait to learn how an application security strategy and policy can mitigate risk and thus safeguard not only your companys informational assets but also your bottom line and brand.