Podcasts about microsegmentation

  • 39PODCASTS
  • 616EPISODES
  • 55mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 21, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about microsegmentation

Latest podcast episodes about microsegmentation

Do This, NOT That: Marketing Tips with Jay Schwedelson l Presented By Marigold
Ep.294- SECRET to 40% Email Open Rate INCREASE! ➕I don't like Las Vegas | Jay's SCOOP

Do This, NOT That: Marketing Tips with Jay Schwedelson l Presented By Marigold

Play Episode Listen Later Mar 21, 2025 11:32 Transcription Available


In this episode of the "Do This, Not That" podcast, Jay Schwedelson dives deep into the power of specificity in marketing. He outlines how using microsegmentation can dramatically enhance your email open rates and social media engagement, leading to more conversions. Jay emphasizes the need to stop vague marketing messages and instead focus on clear, targeted communication that resonates with your audience.=================================================================Best Moments:0:00 - Introduction0:26 - The problem with vague marketing1:50 - Microsegmentation explained2:15 - Business examples of microsegmentation2:54 - Consumer examples of microsegmentation4:00 - Applying microsegmentation to other marketing channels5:58 - Sponsor message: Marigold6:26 - Jay's personal story: Vegas guys' trip dilemma=================================================================Check out our FREE + VIRTUAL EVENTS! -> EVENTASTIC.comGuruConference.comDeliveredConference.com=================================================================MASSIVE thank you to our Sponsor, Marigold!!Looking to master consumer engagement in 2025? The 2025 Consumer Trends Index from Marigold reveals how AI, economic pressures, and personalized marketing are shaping consumer expectations. Uncover data-driven insights to foster stronger brand relationships, strike the right balance between personalization and privacy, and turn casual customers into loyal advocates.Download the 2025 Consumer Trends Index today at meetmarigold.com/guru and stay one step ahead of evolving consumer demands!

Risky Business News
Sponsored: What NSA gets wrong about microsegmentation

Risky Business News

Play Episode Listen Later Sep 29, 2024 14:42


In this Risky Business News sponsored interview, Tom Uren talks to Benny Lakunishok, CEO and cofounder of ZeroNetworks, about network microsegmentation, why it is important, how to do it, and what the NSA gets wrong about it.

Cloudy With a Chance of Trust
A network of one: Rethinking microsegmentation with AirGap co-founder Satish Mohan

Cloudy With a Chance of Trust

Play Episode Listen Later Jul 1, 2024 19:39


Why doesn't malware hop from smartphone to smartphone as with computers? That's the question that led former Airgap CTO Satish Mohan and his co-founders to a fundamental rethink of network segmentation. Mohan sat down with guest host and Zscaler CTO in Residence Sanjit Ganguli to discuss Airgap's origin story, challenges with traditional segmentation, and how a novel architecture helps to overcome them.

ITSPmagazine | Technology. Cybersecurity. Society
Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Story with Benny Lakunishok

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 21, 2024 7:07


Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can't have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.See the platform for yourself - reach out to us at zeronetworks.com for a demo.Learn more about Zero Networks: https://itspm.ag/zeronet-al2d2Note: This story contains promotional content. Learn more.Guest: Benny Lakunishok, Co-Founder and CEO, Zero Networks [@ZeroNetworks]On LinkedIn | https://www.linkedin.com/in/bennyl/On Twitter | https://x.com/lakunishokResourcesLearn more and catch more stories from Zero Networks: www.itspmagazine.com/directory/zero-networksLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Story with Benny Lakunishok

Redefining CyberSecurity

Play Episode Listen Later Jun 21, 2024 7:07


Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can't have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.See the platform for yourself - reach out to us at zeronetworks.com for a demo.Learn more about Zero Networks: https://itspm.ag/zeronet-al2d2Note: This story contains promotional content. Learn more.Guest: Benny Lakunishok, Co-Founder and CEO, Zero Networks [@ZeroNetworks]On LinkedIn | https://www.linkedin.com/in/bennyl/On Twitter | https://x.com/lakunishokResourcesLearn more and catch more stories from Zero Networks: www.itspmagazine.com/directory/zero-networksLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cybersecurity Simplified
Episode 47: Why Reinforce MDR with Zero-Trust Microsegmentation

Cybersecurity Simplified

Play Episode Listen Later Jan 25, 2024 29:28


Let's imagine you have simple lock on your front door. Something a burglar or vandal could easily pick, gaining unrestricted access to your residence. Fearful of the potential loss you add a deadbolt lock to the door, making it much more difficult to enter.In cybersecurity, there's a similar strategy called Zero Trust microsegmentation.Today's guest, Bria Haugli, cybersecurity expert and CEO of SideChannel, explains how Zero Trust microsegmentation can reinforce managed detection and response (MDR) initiatives by enabling tighter access control. And more importantly, by containing the damage from breaches and malware, including insidious ransomware.Don't miss our conversation about this paradigm shift in network security.Learn how Overwatch OT/IoT Security Services can keep you protected end-to-end:  https://www.highwirenetworks.com/services/overwatch-iot-security/ Interested in SideChannel's Enclave? Learn more: https://sidechannel.com/enclave/ To get more cybersecurity news from High Wire Networks, visit: https://www.highwirenetworks.com/news-events/ To learn more about the Cybersecurity Simplified Podcast and to browse previous episodes, visit:https://www.highwirenetworks.com/cybersecurity-podcasts/For more information about this episode, visit: https://www.highwirenetworks.com/cybersecurity-simplified-episode-47-why-reinforce-mdr-with-zero-trust-microsegmentation/Have an inquiry or topic request, reach out to: podcast@highwirenetworks.com 

Hacking Humans
Microsegmentation (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Sep 13, 2022 5:49


A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually. CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.

Packet Pushers - Full Podcast Feed
IPv6 Buzz 109: Microsegmentation With IPv6

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Sep 8, 2022 29:51


In this episode of the IPv6 Buzz podcast, Ed, Scott, and Tom talk about microsegmentation with IPv6 and what the IT use cases look like.

Packet Pushers - Full Podcast Feed
IPv6 Buzz 109: Microsegmentation With IPv6

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Sep 8, 2022 29:51


In this episode of the IPv6 Buzz podcast, Ed, Scott, and Tom talk about microsegmentation with IPv6 and what the IT use cases look like. The post IPv6 Buzz 109: Microsegmentation With IPv6 appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
IPv6 Buzz 109: Microsegmentation With IPv6

Packet Pushers - Fat Pipe

Play Episode Listen Later Sep 8, 2022 29:51


In this episode of the IPv6 Buzz podcast, Ed, Scott, and Tom talk about microsegmentation with IPv6 and what the IT use cases look like.

Packet Pushers - Fat Pipe
IPv6 Buzz 109: Microsegmentation With IPv6

Packet Pushers - Fat Pipe

Play Episode Listen Later Sep 8, 2022 29:51


In this episode of the IPv6 Buzz podcast, Ed, Scott, and Tom talk about microsegmentation with IPv6 and what the IT use cases look like. The post IPv6 Buzz 109: Microsegmentation With IPv6 appeared first on Packet Pushers.

Packet Pushers - IPv6 Buzz
IPv6 Buzz 109: Microsegmentation With IPv6

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Sep 8, 2022 29:51


In this episode of the IPv6 Buzz podcast, Ed, Scott, and Tom talk about microsegmentation with IPv6 and what the IT use cases look like.

Packet Pushers - IPv6 Buzz
IPv6 Buzz 109: Microsegmentation With IPv6

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Sep 8, 2022 29:51


In this episode of the IPv6 Buzz podcast, Ed, Scott, and Tom talk about microsegmentation with IPv6 and what the IT use cases look like. The post IPv6 Buzz 109: Microsegmentation With IPv6 appeared first on Packet Pushers.

Word Notes
Microsegmentation (noun)

Word Notes

Play Episode Listen Later Aug 23, 2022 5:49


A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually. CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.

Cracking Cyber Security Podcast from TEISS
teissTalk: Reducing your attack surface - Zero Trust and microsegmentation

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Aug 10, 2022 47:00


This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk On this episode, we focus on the following news story;#CCSE22: Why Are Organizations Getting Zero Trust "Wrong"?https://www.infosecurity-magazine.com/news/ccse22-zero-trust-wrong/ The panel discussion is titled Reducing your attack surface - Zero Trust and microsegmentation·       Communicating clearly to get IT on-side for your microsegmentation strategy·       Modelling application behaviour to reduce connectivity and availability issues·       Identifying performance-sensitive applications unsuitable for microsegmentation This episode is hosted by Geoff Whitehttps://www.linkedin.com/in/geoffwhitetech/  Our Guests are;Richard Staynings, Teaching Professor, University of Denverhttps://www.linkedin.com/in/richardstaynings/ Andres Andreu, SVP, CISO, 2Uhttps://www.linkedin.com/in/andresandreu/ Larry Cameron, Chief Information Security Officer, Anti-Human Trafficking Intelligence Initiativehttps://www.linkedin.com/in/larrycameron80/

LinkedIn Ads Show
Microsegmentation of Your LinkedIn Ads - EP 65

LinkedIn Ads Show

Play Episode Listen Later Jun 9, 2022 20:57


Show Resources Here were the resources we covered in the episode: Ad Scheduling Account Organization NEW LinkedIn Learning course about LinkedIn Ads by AJ Wilcox Contact us at Podcast@B2Linked.com with ideas for what you'd like AJ to cover.   Show Transcript Micro segmentation of your LinkedIn Ads. Your LinkedIn Rep says it's a bad idea. I say it's great. Let's discuss why this strategy is so divisive. On this week's episode of the LinkedIn Ads Show. Welcome to the LinkedIn Ads Show. Here's your host, AJ Wilcox. Hey there LinkedIn Ads fanatics, your LinkedIn Rep may have warned you against something called micro segmentation, which is what they call it when you create a campaign that has too few members and your target audience. Now, I highly recommend micro segmentation. But our definitions are very different. On this episode, we'll dive into how you can use segmentation to get better ad performance, easier reporting, and definitely to learn more about who your target audience is, and what they engage with. Let's jump right in and hit it. And definitely the next time I decided to coin a term, I'm going to try to make sure that it doesn't match what a LinkedIn Rep warns you against. So everyone knows that LinkedIn ads is great for lead generation. That is, of course, why we come to the platform is access to an ultra premium audience. But a little known fact about LinkedIn Ads is that it's also spectacular for market research. And by market research, I'm not saying run ads, asking people about what they think about your company or anything like that. But you probably already have a good idea of who your ideal customer persona is, right? That's why you're using LinkedIn Ads. So you can target exactly those people. So for example, let's say that your ideal target audience is decision makers in IT. It would be really easy to create one campaign targeting the IT job function, and then layer in all seniorites that or manager and above. And you can run that and that's totally fine. But then after you've run that campaign, you don't get any sort of understanding further about your audience, you might get good ad performance, you might get bad ad performance somewhere in between. But ultimately, because you don't have anything to compare this against, you are left with no levers to pull. So instead, imagine that instead of that one campaign, you've created four separate campaigns. One is IT with a manager seniority. Another one might be IT with a director seniority, another might be IT with a VP seniority. And then finally, your fourth one would be IT with a CXO seniority. So let's say you are running an AB test to this audience, well, you put the same AB test in each of those four campaigns and now you're targeting the same size of audience, you didn't have to create many more ads, you just created the same to over and over again, but now you have four campaigns that you can compare against each other, to learn more about what different segments of your audience are doing, what they like, what they engage with. By doing this, you can get some insights like for instance, maybe CIOs convert higher to the lead. But maybe they're harder for the sales team to get a hold of for a demo. So their cost per SQL ends up being higher. And maybe IT managers have a higher cost per click, but they're easier for sales to get an appointment with. So maybe they have initial higher costs, but when you let it all bake out in your sales funnel, it all of a sudden makes a lot more sense. I like to do this basically, anytime that I'm targeting an audience with multiple singularities. I'll break up that audience by seniority, so I can learn who likes what content. You might see that certain offers are interesting to those who are VP and above. And other offers are more interesting to those who are like manager and director level. And this is really easy to do, you could do the same thing by segmenting by industry. So for instance, let's say you're going after tech companies, what you could do is take LinkedIn's industry of internet, which is obviously very broad. It includes things like Google and Facebook, and Snapchat are all classified as internet. And then you might do a separate campaign for anyone who says that they're in computer software. And then if you compare these results against each other, you might find that one industry actually produces higher quality leads than another. And if you can figure that out early, great. Now you can pare down your budget for the one that isn't working, and feed the one who is and get more of those high quality leads that your sales team loves. A lot of times I'll see campaigns that either clients have been running before they've come to us, or accounts that I'm auditing. And I'll see that they'll have one campaign with a whole bunch of different job functions. So let's say marketing, and accounting, and business development are all in the same campaign. And when you ask them about it, they'll say, well, our message really is irrelevant to all of those people. And I'm not disagreeing with that fact. Your message could be really good for all those people. But the fact that they are all lumped into the same broad campaign means that you'll never learn. Whereas if you broke it out, you might find that, oh, wow, accountants don't interact with this at all. So hey, maybe we spend less on them or maybe we create a custom Add Variation just for the accountants. And this is data that you would only know if you've broken them out. To learn more, you've got to have them in different audiences. We've done the same thing with geographies. So of course, if you're advertising to a whole bunch of different countries, you know that the culture in each of those countries is going to be very different. And so if you haven't broken them out, you might not be able to tell. The big one I remember from my past, I was advertising for franchises in all of North America. And I found that Canada was not converting very well at all. And I had no idea why it eventually dawned on me that in my form, I was asking for a zip code. And in Canada, they don't call it a zip code, they call it a postal code. And so it was very, very apparent that I was an American, trying to advertise to Americans, and just added Canada on. So as soon as I gave them their own form, conversion start flowing in. So you can do this, if you are going after all North America. Or maybe you're advertising to all English speaking countries, like the US, Canada, the UK, Australia, New Zealand, as long as your audience sizes are large enough, in each of those countries by themselves. If you give them their own campaign, it then allows you to suss out and find what are those cultural differences that are making people convert higher, interact higher, convert lower, interact lower, we've even done this in the US with time zones. So we'll add all of the states that are in the Pacific Time Zone, to their own campaign, all states that are mountain time into their own campaign, Central Time, Eastern Time Zone, etc. And by doing that, it allows us to do some really cool day parting. Because if you start showing ads to people on the East Coast, at 6am, their time, you'll all of a sudden be advertising to people on the west coast at 3am, which isn't a great time to be advertising. So if you've put them in different time zones, and then you're turning your campaigns on and off at those times, it's gonna be a lot more exact, you won't waste your money nearly as much. If you want to dive more into day parting and ad scheduling, definitely check out episode 63. 7:31 We also really like to segment by company size. So what you can do is say, hey, if we go after all companies that are size 200. and above, well, let's put 200 to 500 in its own campaign, and then 500 to 1000 in its own campaign, and then maybe 1000 to 5000 in its own, and then 5000 and above in its own. And now all of a sudden you get to judge what is your cost per lead by company size. And a lot of sales teams will look at a company size to tell you what quality of lead that is. And they care more about the larger companies, because they're gonna have a lot more budget to do this. And that's super easy to do exactly like we talked about earlier. And there's a whole lot of other segments that you can also break up campaigns by, for instance, you could do field of study. So what did someone study in college, you can do growth rate of a company, those that are growing slowly versus those that are rapidly growing, and message them differently, you can really segment by any sort of targeting that is broad. And what I mean by broad, it means that there are a few options that broadly define the entire market, it doesn't usually make sense to do this to segment by job title, or by group. Because when you put one set of people into a group, or specify one job title, and then you specify another, you're still leaving out a huge chunk of the population. This isn't a great way of splitting the audience up to learn more about it, you're going to end up with really small target audiences. So think about how you can break up by some of those elements like seniority or job function, industry, geography, company size, those types of things. Plus, it really didn't cost you anything extra to break out all of these micro segments of your audience. But now you can test all of your offers and motivations to find out what engages and drives each micro segment of your target audience. Plus, now you have all these extra levers that you can pull when you want to improve performance. So for instance, if you're pacing ahead of budget one month, it's really easy to just go down and bid down the lowest performing micro segments. And that's going to naturally push your ad performance higher while restricting the budget. Or maybe your sales team tells you that certain types of leads are worth more to them. They're a higher quality lead, so you can bid down or shut off the micro segments that are pulling your performance down and feed the ones that are more like what sales wants. And since you already have these campaigns, you can take it a step further by adjusting your ad copy to talk directly to the people. For instance, in the past, when I was going after business owners or CEOs, I would put in the ad copy, "Hey CEOs" to try to get their attention. Because you've already defined who your audience is in these little micro segments, if you can think of a call out to them that they would recognize, this becomes a test that you can easily do to call out to people. One thing that I noticed when I was doing this, calling out to people by some sort of an identity, it certainly makes sense sometimes when they identify themselves by that entity. But sometimes you'll call out to people, and they don't define themselves by that. So for instance, if I were going after marketing directors, if I shout out to them, "Hey Directors", they may not actually identify themselves, strongly by the fact that they're a director, they might identify themselves more powerfully as marketers, so I might do better to say, "Hey Marketers", or "Hey Marketing Leaders". Okay, here's a quick sponsor break. And then we'll dive into how you can actually use these micro segments to optimize and control your account performance. 11:26 The LinkedIn Ads Show is proudly brought to you by B2Linked.com, the LinkedIn Ads experts. If the performance of your LinkedIn Ads is important to you, B2Linked is the agency you'll want to work with. We've spent over $150 million on LinkedIn Ads, and no one outperforms us on getting you the lowest cost per lead, and the most scale. We're official LinkedIn partners and you'll deal only with LinkedIn Ads, experts from day one. Apply to work with us on the contact page of B2Linked.com, we'd absolutely love to get to work with you. Alright, let's go ahead and jump into how you can actually control and optimize your account when you have these micro segments. So I use the example before how if you're pacing ahead of budget, you can turn some things off that aren't super helpful to your account. Every so often, a client will come to us mid month and say, for some reason, my boss just cut our budget in half for this month, we have to slow things way down. Well, if the account has an average cost per lead of like $80, for instance, it's really quick to go and segment all of my campaigns by their cost per lead, and sort from high to low. And all of a sudden, here's this list of the 20 campaigns that are bringing leads in for significantly more than that. So I have some that are bringing in leads for $100 and some $150 and $250, for instance. So we're reacting to a pretty urgent call from the client to cut down on budget and spend less. But by doing it this way, we go in and pause all of the campaign's that are performing worse than average, we've stopped spending as rapidly. And now we don't have spend going to those campaigns that are having a high cost per lead. So as we're cutting down on our spend, we're also watching our average cost per lead drop. So it was an ad. And after cutting out the higher CPL campaigns, we might be averaging 60 or 50. And it's a great way to finish that month, especially if we know that we had less budget to work with. We had a client who was in the business financing space, and they had three different industries they were going after. So naturally, we had the campaigns all segmented out by industry and we found that the retail industry for whatever reason, was underperforming compared to the others. And so it was really easy to go through as a blanket change and pause or bid down all of the retail industry segments. And we put that budget into the to other industries that were performing well. And it's important to know that if you had all three of these industries lumped into the same campaign, you would have totally missed that fact that that was an optimization you could do. If you haven't listened to episode seven, where we talk about account organization, you'll definitely want to go and listen to that. Because I recommend a campaign naming structure that identifies within the campaign name exactly who that audience is. And what's so cool about this is when we micro segment and we're describing who the audience is right within the campaign name, it makes reporting super easy, and gives you capabilities that you wouldn't have otherwise. So for instance, if all of your campaigns that are targeting directors have something like DIR for director in them, when you go to start your campaigns and look at the results by campaign, you can very quickly find all of those that are targeting directors. And if you find that directors are performing really well, great, you now know all of the campaigns to go and increase your bids on or give some expanded budget. Also in our campaigns, we identify the type of targeting we're using. So we might put JF in a campaign name, when it's targeting by job function, we might put JT, if it's targeting by job title. Then when we get all of the results, let's say from the whole sales funnel, we can very quickly combine in a pivot table all of those audience names, and combine all of the performance from job title targeting versus job function versus skills targeting versus groups targeting. And we'll find some things like oh, wow, job function over here is more expensive, or leads to more volume, or groups targeting is really, really limited on audience size. But boy, it's efficient when it works. So definitely go back and listen to episode seven to get more information about how we do that so you can do the same thing. 15:57 I'm sure many of you already know my feelings on using audience expansion on LinkedIn. Let me tell you why I hate it. Because it is exactly the opposite of micro segmentation. We're talking about taking specific audiences and breaking them out so that we can compare them against each other and learn from the differences. Well, when you use audience expansion, it takes an existing large audience, and it adds people to it, that you don't know who they are. You don't get to gauge the quality of that audience until later when your sales team comes to you and says, hey, the quality of leads have been really crappy recently. So not only are you giving LinkedIn the opportunity to insert low quality audiences into your campaign, but it mashes those audiences together in a really opaque or non transparent way, and makes it impossible to actually learn from. So if you want to expand on your audiences, I would highly recommend go and create a look alike audience instead, because at least a look alike audience will allow you to run the native audience and the look alike that was created from it separately. And now you can compare and find out like, oh, look alikes are performing well, or no, they're not, we should stop doing that. So please, please, please, if you have audience expansion turned on anywhere in your account, please go turn it off. You can thank me later. So I can already hear a couple of you saying like, well, if I break out all of my audiences into micro segments, that's a lot of campaigns to manage. And yeah, that's the truth, you may be managing more campaigns, but it only takes a few minutes to create a duplicate of a campaign. And so the rewards of doing this are much, much higher than I feel like what the cost increase is for you in managing the account in your time. Plus, we manage accounts with 1000s of campaigns in them. So I can tell you, it's definitely scalable, it's possible, you're not going to make a huge mistake by breaking things out to learn more about your audience. It's also really likely that you're not going to be running all of these campaigns forever. Because once you find those micro audience segments that are underperforming in comparison to others, you can always cut them out by pausing. I mean, obviously, pausing is the best way, but you could always bid them down if you just wanted to get their costs lower. And when you take those campaigns out of the mix, you're giving yourself fewer campaigns to manage. I can also hear some of you saying, Well, my LinkedIn Rep says that I should only run campaigns that have an audience size of at least 300,000. Well, by breaking up your existing audiences into smaller segments, you're still targeting the same audience size in total. So you can tell your LinkedIn Rep, we're still targeting the same people, they're just in more campaigns. Plus, now you'll see better performance with your ability to turn off or bid down any segments of the non performers, which you wouldn't even be able to tell were being targeted before when it was just one big lump campaign. And my opinion is, you're already paying a premium for using LinkedIn, which means you're paying more for LinkedIn leads than you are under their channels. So why not have that budget also give you insights into the behavior of your customer persona. Plus, everyone who's running LinkedIn ads is always looking for ways of decreasing costs, because costs are already so high. This is one of the ways that you can do that really effectively. All right, I've got the episode resources for you coming right up. So stick around 19:29 Thank you for listening to the LinkedIn Ads show. Hungry for more? AJ Wilcox, take it away. All right, here are a couple of great resources for you. Number one, go check out Episode 63 on ad scheduling. To find out how we schedule our ads at different times of day and different days of the week. Check out Episode 07 about account organization for how you can make it easier to report and easier to find insights. If you or someone on your team are looking to learn more about LinkedIn Ads, check out the course that I did on LinkedIn Learning with LinkedIn. The link is right there in the show notes below. And this is by far the least expensive, and the best quality course out there. If you're a new listener to the show, hit that subscribe button. So you can hear more of this when we come out with new episodes weekly. And please do consider rating. And definitely leave us a review on the podcast. We would absolutely love to hear what you think. And when you leave a review, we'll shout you out live on the show. With feedback or suggestions on the podcast, reach out to us at Podcast@B2Linked.com. And with that being said, we'll see you back here next week. Cheering you on in your LinkedIn Ads initiatives.

XenTegra - Nutanix Weekly
Nutanix Weekly: Nutanix Unleashes Flow Networking to Streamline Hybrid Cloud Connectivity

XenTegra - Nutanix Weekly

Play Episode Listen Later Nov 12, 2021 43:59 Transcription Available


Software-Defined Networking (SDN) has come a long way since its inception in 2009 (check out MIT's review on this). Today, SDN is poised to become the de facto control and management solution for networks everywhere. This trend toward SDN has been accelerated through the exponential digital transformation of the pandemic with customers now looking to hybrid multi-cloud for answers.Nutanix's SDN journey chartered a new path in 2018 with SDN, launching Nutanix® Flow Security with Microsegmentation then quickly followed with a robust ID Based Firewall and Security Planning solution. These were the first pillars of our SDN vision.Fast-following Flow Security, Nutanix implemented the second key pillar of SDN: Network Virtualization, or as Nutanix calls it, Flow Networking™. First introduced to provide secure multi-tenant network virtualization in Nutanix's managed Disaster-Recovery-as-a-Service (or DRaaS) offering, Flow Networking quickly evolved for on-premise Nutanix customers, becoming available for Early Access following its announcement soon after .NEXT 2020.Host: Harvey GreenCo-Host: Jirah CoxCo-Host: Andy Whiteside

Packet Pushers - Full Podcast Feed
Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Oct 4, 2021 53:40


This week's Network Break talks about a new data center chassis from Juniper, why Akamai spent $600 million to buy security company Guardicore, what happened to Zoom's big acquisition of a contact center company, and more tech news.

Packet Pushers - Network Break
Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation

Packet Pushers - Network Break

Play Episode Listen Later Oct 4, 2021 53:40


This week's Network Break talks about a new data center chassis from Juniper, why Akamai spent $600 million to buy security company Guardicore, what happened to Zoom's big acquisition of a contact center company, and more tech news.

Packet Pushers - Fat Pipe
Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation

Packet Pushers - Fat Pipe

Play Episode Listen Later Oct 4, 2021 53:40


This week's Network Break talks about a new data center chassis from Juniper, why Akamai spent $600 million to buy security company Guardicore, what happened to Zoom's big acquisition of a contact center company, and more tech news.

Packet Pushers - Fat Pipe
Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation

Packet Pushers - Fat Pipe

Play Episode Listen Later Oct 4, 2021 53:40


This week's Network Break talks about a new data center chassis from Juniper, why Akamai spent $600 million to buy security company Guardicore, what happened to Zoom's big acquisition of a contact center company, and more tech news. The post Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation appeared first on Packet Pushers.

Packet Pushers - Network Break
Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation

Packet Pushers - Network Break

Play Episode Listen Later Oct 4, 2021 53:40


This week's Network Break talks about a new data center chassis from Juniper, why Akamai spent $600 million to buy security company Guardicore, what happened to Zoom's big acquisition of a contact center company, and more tech news. The post Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation appeared first on Packet Pushers.

Packet Pushers - Full Podcast Feed
Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Oct 4, 2021 53:40


This week's Network Break talks about a new data center chassis from Juniper, why Akamai spent $600 million to buy security company Guardicore, what happened to Zoom's big acquisition of a contact center company, and more tech news. The post Network Break 353: New Juniper Chassis Tops 400G; Akamai Spends Big Money On Microsegmentation appeared first on Packet Pushers.

Data Center Therapy
#064 - No Silver Bullets: Security Series, Part One

Data Center Therapy

Play Episode Listen Later Sep 23, 2021 29:38


Welcome back to another episode of Data Center Therapy where the topic this week is all things security related.  With your hosts Matt “You sure you wanna kick that can down the road?” Yette and Matt “The answer is: It Depends!” Cozzolino, the intrepid DCT Duo has a quick and fun but also informative podcast all around Information Technology Security this week. In this episode, the Matts answer a few white-hot, timely and relevant questions such as: Is the sole purpose of SD-WAN to reduce costs by eliminating proprietary networking circuits? Is there a way to implement a SIEM without full time engineers manning a security NOC 24x7? In a zero-sum budget game, what's the solution to security issues - endpoint protection, firewalls, multi-factor authentication (MFA), or microsegmentation? Join us on this fast and light run through the landscape of security technologies, where you'll get a high-level overview of the technologies and solutions that the Matts work with and prescribe for the folks they help.  As always, the Matts keep it funny and refreshingly frank, so give it a listen and if you like it, be sure to like, share and subscribe wherever finer podcasts are found.  Thanks for listening and stay safe, stay informed, harden those security postures, and we'll catch you on the next episode of Data Center Therapy!

Paul's Security Weekly
Everyone Works Everywhere - ESW #235

Paul's Security Weekly

Play Episode Listen Later Jul 23, 2021 101:23


This week, in our first segment, we welcome Ed Rossi, Vice President of Product Management, Asset Inventory & Discovery at Qualys, to talk about Reinventing Asset Inventory for Security! Then, in the Enterprise News, SafeBreach adds support for new advanced attacks to the Microsoft Defender for Endpoint evaluation lab, Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks, Bugcrowd Awarded U.S. Patents for Crowd-Enabled Vulnerability Detection, Microsoft puts PCs in the cloud with Windows 365, some funding and acquisition updates from Sysdig, AttackIQ, Stytch, SentinelOne, & more! Finally, we wrap up the show with two micro interviews from RSAC2021 featuring Mark Ralls from Acunetix by Invicti, and Wayne Haber from GitLab!   Show Notes: https://securityweekly.com/esw235 Segment Resources: CSAM free trial: https://www.qualys.com/forms/cybersecurity-asset-management/ CSAM video overview: https://vimeo.com/551723071 Webpage: https://www.qualys.com/apps/cybersecurity-asset-management/ Visit https://securityweekly.com/qualys to learn more about them! Visit https://securityweekly.com/acunetix to learn more about them! Visit https://securityweekly.com/gitlab to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Enterprise Security Weekly (Audio)
Everyone Works Everywhere - ESW #235

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jul 23, 2021 101:23


This week, in our first segment, we welcome Ed Rossi, Vice President of Product Management, Asset Inventory & Discovery at Qualys, to talk about Reinventing Asset Inventory for Security! Then, in the Enterprise News, SafeBreach adds support for new advanced attacks to the Microsoft Defender for Endpoint evaluation lab, Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks, Bugcrowd Awarded U.S. Patents for Crowd-Enabled Vulnerability Detection, Microsoft puts PCs in the cloud with Windows 365, some funding and acquisition updates from Sysdig, AttackIQ, Stytch, SentinelOne, & more! Finally, we wrap up the show with two micro interviews from RSAC2021 featuring Mark Ralls from Acunetix by Invicti, and Wayne Haber from GitLab!   Show Notes: https://securityweekly.com/esw235 Segment Resources: CSAM free trial: https://www.qualys.com/forms/cybersecurity-asset-management/ CSAM video overview: https://vimeo.com/551723071 Webpage: https://www.qualys.com/apps/cybersecurity-asset-management/ Visit https://securityweekly.com/qualys to learn more about them! Visit https://securityweekly.com/acunetix to learn more about them! Visit https://securityweekly.com/gitlab to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Why Transparency Matters & Web Application Prioritization - Mark Ralls, Wayne Haber - ESW #235

Paul's Security Weekly TV

Play Episode Listen Later Jul 23, 2021 39:00


The shift away from web application security, caused by the pandemic and the focus on remote workforces, resulted in an increased number of web vulnerabilities. In this segment, Mark talks about the best starting point for organizations to get back on track and prioritize your web app security. This segment is sponsored by Acunetix. Visit https://securityweekly.com/acunetix to learn more about them!   Security can be somewhat of a mystery at a lot of organizations. Most companies choose to be tight-lipped about the security measures they have implemented. Rightfully so, there is an underlying fear that publicizing your security efforts could make you more vulnerable to security attacks and damage your reputation with your customers. However, there is another way. Transparency can be your ally in security. This segment is sponsored by GitLab. Visit https://securityweekly.com/gitlab to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw235

Enterprise Security Weekly (Video)
Why Transparency Matters & Web Application Prioritization - Mark Ralls, Wayne Haber - ESW #235

Enterprise Security Weekly (Video)

Play Episode Listen Later Jul 22, 2021 39:00


The shift away from web application security, caused by the pandemic and the focus on remote workforces, resulted in an increased number of web vulnerabilities. In this segment, Mark talks about the best starting point for organizations to get back on track and prioritize your web app security. This segment is sponsored by Acunetix. Visit https://securityweekly.com/acunetix to learn more about them!   Security can be somewhat of a mystery at a lot of organizations. Most companies choose to be tight-lipped about the security measures they have implemented. Rightfully so, there is an underlying fear that publicizing your security efforts could make you more vulnerable to security attacks and damage your reputation with your customers. However, there is another way. Transparency can be your ally in security. This segment is sponsored by GitLab. Visit https://securityweekly.com/gitlab to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw235

Application Security Weekly (Audio)
Fall On Our Sword - ASW #158

Application Security Weekly (Audio)

Play Episode Listen Later Jul 20, 2021 75:01


This week, we welcome David DeSanto, Senior Director, Product Management, Dev & Sec at Gitlab! In the wake of events such as the Solarwinds breach, there has been a lot of misinformation about the role of open source in DevSecOps. GitLab believes everyone benefits when everyone can contribute. Open source plays a key role in how GitLab addresses DevSecOps. We will discuss GitLab's view of the role of open source in DevSecOps including recent contributions to the open source community as well as GitLab's plans for the future.   In the AppSec News: Security from code comments, visualizing decision trees, bypassing Windows Hello, security analysis of Telegram, paying for patient bug bounty programs, cloud risks, & more!   Show Notes: https://securityweekly.com/asw158 Visit https://securityweekly.com/gitlab to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Code Comments, Decision Trees, Windows Hello, Telegram Analysis, & Cloud Risks - ASW #158

Paul's Security Weekly TV

Play Episode Listen Later Jul 20, 2021 38:36


This week in the AppSec News: Security from code comments, visualizing decision trees, bypassing Windows Hello, security analysis of Telegram, paying for patient bug bounty programs, cloud risks, & more!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw158

Paul's Security Weekly
Fall On Our Sword - ASW #158

Paul's Security Weekly

Play Episode Listen Later Jul 20, 2021 75:01


This week, we welcome David DeSanto, Senior Director, Product Management, Dev & Sec at Gitlab! In the wake of events such as the Solarwinds breach, there has been a lot of misinformation about the role of open source in DevSecOps. GitLab believes everyone benefits when everyone can contribute. Open source plays a key role in how GitLab addresses DevSecOps. We will discuss GitLab's view of the role of open source in DevSecOps including recent contributions to the open source community as well as GitLab's plans for the future.   In the AppSec News: Security from code comments, visualizing decision trees, bypassing Windows Hello, security analysis of Telegram, paying for patient bug bounty programs, cloud risks, & more!   Show Notes: https://securityweekly.com/asw158 Visit https://securityweekly.com/gitlab to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Application Security Weekly (Video)
Code Comments, Decision Trees, Windows Hello, Telegram Analysis, & Cloud Risks - ASW #158

Application Security Weekly (Video)

Play Episode Listen Later Jul 20, 2021 38:36


This week in the AppSec News: Security from code comments, visualizing decision trees, bypassing Windows Hello, security analysis of Telegram, paying for patient bug bounty programs, cloud risks, & more!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw158

Paul's Security Weekly TV
The Role of Open Source in DevSecOps - David DeSanto - ASW #158

Paul's Security Weekly TV

Play Episode Listen Later Jul 19, 2021 36:35


In the wake of events such as the Solarwinds breach, there has been a lot of misinformation about the role of open source in DevSecOps. GitLab believes everyone benefits when everyone can contribute. Open source plays a key role in how GitLab addresses DevSecOps. We will discuss GitLab's view of the role of open source in DevSecOps including recent contributions to the open source community as well as GitLab's plans for the future. This segment is sponsored by GitLab. Visit https://securityweekly.com/gitlab to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw158

Application Security Weekly (Video)
The Role of Open Source in DevSecOps - David DeSanto - ASW #158

Application Security Weekly (Video)

Play Episode Listen Later Jul 19, 2021 36:35


In the wake of events such as the Solarwinds breach, there has been a lot of misinformation about the role of open source in DevSecOps. GitLab believes everyone benefits when everyone can contribute. Open source plays a key role in how GitLab addresses DevSecOps. We will discuss GitLab's view of the role of open source in DevSecOps including recent contributions to the open source community as well as GitLab's plans for the future. This segment is sponsored by GitLab. Visit https://securityweekly.com/gitlab to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw158

Application Security Weekly (Audio)
Drink Our Own Champagne - ASW #157

Application Security Weekly (Audio)

Play Episode Listen Later Jul 13, 2021 72:51


In the AppSec news, a password manager makes predictable mistakes, Trusted Types terminate DOM XSS, waking up from PrintNightmare, understanding hardware fault injections.   The truth is, most web app and API security tools were designed for a very different era. A time before developers and security practitioners worked together, before applications were globally distributed and API-based. But attackers are developers too, and they aren't bogged down by the limitations of legacy solutions. It's never been more clear that it's time for a change. Sean will outline new rules for web application and API security that respect the way modern applications are built.   Show Notes: https://securityweekly.com/asw157 https://www.fastly.com/blog/the-new-rules-for-web-application-and-api-security This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
Drink Our Own Champagne - ASW #157

Paul's Security Weekly

Play Episode Listen Later Jul 13, 2021 72:51


In the AppSec news, a password manager makes predictable mistakes, Trusted Types terminate DOM XSS, waking up from PrintNightmare, understanding hardware fault injections.   The truth is, most web app and API security tools were designed for a very different era. A time before developers and security practitioners worked together, before applications were globally distributed and API-based. But attackers are developers too, and they aren't bogged down by the limitations of legacy solutions. It's never been more clear that it's time for a change. Sean will outline new rules for web application and API security that respect the way modern applications are built.   Show Notes: https://securityweekly.com/asw157 https://www.fastly.com/blog/the-new-rules-for-web-application-and-api-security This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Password Mismanager, Trusted Types vs. DOM XSS, PrintNightmare, & Fault Injections - ASW #157

Paul's Security Weekly TV

Play Episode Listen Later Jul 13, 2021 44:49


In the AppSec news, a password manager makes predictable mistakes, Trusted Types terminate DOM XSS, waking up from PrintNightmare, understanding hardware fault injections.   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw157

Paul's Security Weekly TV
Web App and API Security Needs to Be Modernized: Here's How - Sean Leach - ASW #157

Paul's Security Weekly TV

Play Episode Listen Later Jul 13, 2021 28:05


The truth is, most web app and API security tools were designed for a very different era. A time before developers and security practitioners worked together, before applications were globally distributed and API-based. But attackers are developers too, and they aren't bogged down by the limitations of legacy solutions. It's never been more clear that it's time for a change. Sean will outline new rules for web application and API security that respect the way modern applications are built. https://www.fastly.com/blog/the-new-rules-for-web-application-and-api-security   This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw157  

Application Security Weekly (Video)
Web App and API Security Needs to Be Modernized: Here's How - Sean Leach - ASW #157

Application Security Weekly (Video)

Play Episode Listen Later Jul 13, 2021 28:05


The truth is, most web app and API security tools were designed for a very different era. A time before developers and security practitioners worked together, before applications were globally distributed and API-based. But attackers are developers too, and they aren't bogged down by the limitations of legacy solutions. It's never been more clear that it's time for a change. Sean will outline new rules for web application and API security that respect the way modern applications are built. https://www.fastly.com/blog/the-new-rules-for-web-application-and-api-security   This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them!   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw157  

Application Security Weekly (Video)
Password Mismanager, Trusted Types vs. DOM XSS, PrintNightmare, & Fault Injections - ASW #157

Application Security Weekly (Video)

Play Episode Listen Later Jul 13, 2021 44:49


In the AppSec news, a password manager makes predictable mistakes, Trusted Types terminate DOM XSS, waking up from PrintNightmare, understanding hardware fault injections.   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw157  

Paul's Security Weekly TV
MalWare Labs and Why You Should Challenge Shift-Left Testing - Mario Vuksan, Rickard Carlsson - ESW #233

Paul's Security Weekly TV

Play Episode Listen Later Jul 2, 2021 40:47


Threat hunters are under increased pressure to rapidly analyze, classify, detect and respond to malicious files. ReversingLabs is stepping forward to address these needs with its new Malware Lab Solution. The ReversingLabs Malware Lab solution powers the next generation of threat hunting by delivering a unique combination of static and dynamic analysis capabilities at scale to identify malicious files including those in the software supply chain. This segment is sponsored by Reversing Labs. Visit https://securityweekly.com/ReversingLabs to learn more about them!   The development life cycle as we know it is rapidly changing, and today's AppSec testing needs to keep up with shorter and faster processes. A shift-left approach is no longer enough to protect web assets - you need much more dynamic tools and ways of working. This segment is sponsored by Detectify. Visit https://securityweekly.com/detectify to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw233

Enterprise Security Weekly (Video)
MalWare Labs and Why You Should Challenge Shift-Left Testing - Mario Vuksan, Rickard Carlsson - ESW #233

Enterprise Security Weekly (Video)

Play Episode Listen Later Jul 1, 2021 40:47


Threat hunters are under increased pressure to rapidly analyze, classify, detect and respond to malicious files. ReversingLabs is stepping forward to address these needs with its new Malware Lab Solution. The ReversingLabs Malware Lab solution powers the next generation of threat hunting by delivering a unique combination of static and dynamic analysis capabilities at scale to identify malicious files including those in the software supply chain. This segment is sponsored by Reversing Labs. Visit https://securityweekly.com/ReversingLabs to learn more about them!   The development life cycle as we know it is rapidly changing, and today's AppSec testing needs to keep up with shorter and faster processes. A shift-left approach is no longer enough to protect web assets - you need much more dynamic tools and ways of working. This segment is sponsored by Detectify. Visit https://securityweekly.com/detectify to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw233

Paul's Security Weekly TV
Why DAST - from Project Management Perspective - Suha Akyuz - ESW #233

Paul's Security Weekly TV

Play Episode Listen Later Jul 1, 2021 30:53


More than 96% of software development projects fail across the globe because too many businesses rely on the legacy DevOps process which allows us to run security testing right before going to production. Using the legacy DevOps can lead to a downfall of the project management triangle (Budget, Scope, and Time). However, with more efficient use of dynamic application security testing tools (DAST) in every single stage/sprint, the legacy DevOps can be transformed into DevSecOps, in turn preventing our projects from failing.   This segment is sponsored by Netsparker. Visit https://securityweekly.com/netsparker to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw233

Business Security Weekly (Audio)
The Behemoth - BSW #222

Business Security Weekly (Audio)

Play Episode Listen Later Jun 30, 2021 63:30


This week, we welcome Jim Richberg, Public Sector Field CISO at Fortinet, to discuss The Year of Hybrid! In the Leadership and Communications section: Cybersecurity today requires greater digital and business understanding, 12 skills business continuity managers need to succeed, SOC burnout is real: 3 preventative steps every CISO must take, and more!   Show Notes: https://securityweekly.com/bsw222 Visit https://securityweekly.com/fortinet to learn more about them! https://www.fortinet.com/blog   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/bsw for all the latest episodes!

Enterprise Security Weekly (Video)
Why DAST - from Project Management Perspective - Suha Akyuz - ESW #233

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 30, 2021 30:53


More than 96% of software development projects fail across the globe because too many businesses rely on the legacy DevOps process which allows us to run security testing right before going to production. Using the legacy DevOps can lead to a downfall of the project management triangle (Budget, Scope, and Time). However, with more efficient use of dynamic application security testing tools (DAST) in every single stage/sprint, the legacy DevOps can be transformed into DevSecOps, in turn preventing our projects from failing.   This segment is sponsored by Netsparker. Visit https://securityweekly.com/netsparker to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw233

Enterprise Security Weekly (Audio)
Hope & Pray - ESW #233

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jun 30, 2021 113:05


This week, in our first segment, we welcome Suha Akyuz, Application Security Manager at Invicti Security, to discuss “Why DAST? from the Project Management Perspective”! In the Enterprise News, Atos launches thinkAI, AWS welcomes Wickr to the team, U.S. DoD approves two (ISC)² certifications as requirements for staff, & JFrog to acquire Vdoo! Finally, we wrap up the show with two micro interviews from RSAC featuring Mario Vuksan, CEO of ReversingLabs, & Rickard Carlsson, CEO Detectify!   Show Notes: https://securityweekly.com/esw233 Visit https://securityweekly.com/ReversingLabs to learn more about them! Visit https://securityweekly.com/detectify to learn more about them! Visit https://securityweekly.com/netsparker to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
The Behemoth - BSW #222

Paul's Security Weekly

Play Episode Listen Later Jun 30, 2021 63:30


This week, we welcome Jim Richberg, Public Sector Field CISO at Fortinet, to discuss The Year of Hybrid! In the Leadership and Communications section: Cybersecurity today requires greater digital and business understanding, 12 skills business continuity managers need to succeed, SOC burnout is real: 3 preventative steps every CISO must take, and more!   Show Notes: https://securityweekly.com/bsw222 Visit https://securityweekly.com/fortinet to learn more about them! https://www.fortinet.com/blog   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/bsw for all the latest episodes!

Packet Pushers - Full Podcast Feed
Briefings In Brief 098: Cisco Tetration Enables Microsegmentation And App Dependency Mapping

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Nov 18, 2020 10:58


Cisco Tetration enables microsegmentation and application dependency mapping for on-premises and cloud applications. This Briefings In Brief explores essential details on Tetration, including how it works and how it fits with other products in Cisco's portfolio. This briefing is based on a Security Field Day presentation by Cisco on the Tetration product.

Packet Pushers - Fat Pipe
Briefings In Brief 098: Cisco Tetration Enables Microsegmentation And App Dependency Mapping

Packet Pushers - Fat Pipe

Play Episode Listen Later Nov 18, 2020 10:58


Cisco Tetration enables microsegmentation and application dependency mapping for on-premises and cloud applications. This Briefings In Brief explores essential details on Tetration, including how it works and how it fits with other products in Cisco's portfolio. This briefing is based on a Security Field Day presentation by Cisco on the Tetration product.

Packet Pushers - Briefings In Brief
Briefings In Brief 098: Cisco Tetration Enables Microsegmentation And App Dependency Mapping

Packet Pushers - Briefings In Brief

Play Episode Listen Later Nov 18, 2020 10:58


Cisco Tetration enables microsegmentation and application dependency mapping for on-premises and cloud applications. This Briefings In Brief explores essential details on Tetration, including how it works and how it fits with other products in Cisco's portfolio. This briefing is based on a Security Field Day presentation by Cisco on the Tetration product.