POPULARITY
Technology Radar znów nadaje! Łukasz i Szymon prześwietlają najnowszy vol. 32 z mikroskopijną dokładnością. Humor miesza się z technicznymi analizami, gdy panowie omawiają AI Accelerated Shadow IT i SAFe umieszczone na hold. Od Cursor przez DeepSeek-1 do Model Context Protocol - wszystkie nowe technologie przechodzą przez patoarchitektoniczne sito. OpenTelemetry wskakuje na adopt, a GitLab CI/CD awansuje po trzech latach w trial. Dapr i Aspire od Microsoftu wywołują u prowadzących mieszane uczucia. Sprawdź, które narzędzia AI warto wdrożyć, a które omijać szerokim łukiem! Zamiast czytać 150-stronicowy raport, posłuchaj Technology Radar Review i zostań ekspertem od najnowszych trendów. Następnym razem na spotkaniu zaimponujesz wiedzą o Just-in-time Privileged Access Management! A teraz nie ma co się obijać!
Welcome to Security Matters, the next evolution of CyberArk's podcast. Previously known as Trust Issues, this show has always brought expert insights into the world of identity security.Hosted by David Puner, Senior Editorial Manager at CyberArk, Security Matters refines its focus to emphasize a proactive approach to cybersecurity. The podcast will delve into the principle of "Think like an attacker," highlighting the importance of staying ahead of threats rather than merely reacting to them.Each episode will feature deep insights, expert perspectives, and actionable strategies to help empower listeners to defend and protect their organizations and the digital world. Topics will include securing the entire spectrum of identities—both human and machine—protecting hybrid and multi-cloud environments and analyzing the latest attack methods.Join Security Matters to explore why how you approach security truly matters.Coming mid-Feb. 2025 to this stream and most major podcast platforms.
Trust in cybersecurity is built on the bedrock of Privileged Access Management. Explore how Syteca's innovative approaches redefine security, addressing today's challenges with precision and foresight. Read the original blog post here: https://www.kuppingercole.com/blog/fisher/the-role-of-pam-in-modern-cybersecurity
People Work Technology stond dit keer in het teken van wachtwoord management. Had jij ook moeite om je wachtwoord na de vakantie weer te herinneren? Richard Bordes ging met Martin Kooiman van WinSys in gesprek over de impact van de LockBit 3.0-ransomware op zijn organisatie en klanten. Dennis Tossijn van Huawei en Wim Bos van Lumiad schoven aan om uit te leggen welke invloed AI heeft op de kwaliteit, capaciteit en veiligheid van ICT-netwerken. Ook werd er gesproken met Roelant van der Munnik van Nationale Nederlanden en Alexandra Krasnitskaya van Delinea. Hoe passen zij Privileged Access Management toe? Tot slot schoven Cameron Boswell en Wilco van Dijk van Intermedia Cloud Communications aan in de studio. Wat zijn de laatste ontwikkelingen op het gebied van Unified Communications as a Service (UCaaS)? People Work Technology wordt elke tweede vrijdag van de maand, van 14:00 tot 16:00 uur, live uitgezonden op New Business Radio en is achteraf terug te luisteren via alle bekende podcastkanalen.
People Work Technology stond dit keer in het teken van wachtwoord management. Had jij ook moeite om je wachtwoord na de vakantie weer te herinneren? Richard Bordes ging met Martin Kooiman van WinSys in gesprek over de impact van de LockBit 3.0-ransomware op zijn organisatie en klanten. Dennis Tossijn van Huawei en Wim Bos van Lumiad schoven aan om uit te leggen welke invloed AI heeft op de kwaliteit, capaciteit en veiligheid van ICT-netwerken. Ook werd er gesproken met Roelant van der Munnik van Nationale Nederlanden en Alexandra Krasnitskaya van Delinea. Hoe passen zij Privileged Access Management toe? Tot slot schoven Cameron Boswell en Wilco van Dijk van Intermedia Cloud Communications aan in de studio. Wat zijn de laatste ontwikkelingen op het gebied van Unified Communications as a Service (UCaaS)? People Work Technology wordt elke tweede vrijdag van de maand, van 14:00 tot 16:00 uur, live uitgezonden op New Business Radio en is achteraf terug te luisteren via alle bekende podcastkanalen.
Dive into the complexities of Active Directory security in this episode of The Resilience Rundown. Discover essential best practices like regular patching, the separation of user and admin accounts, and the implementation of Privileged Access Management solutions. Learn how to shield your systems from social engineering and misconfigurations, and why a robust recovery plan is your safety net in the digital age. Whether you're a seasoned IT professional or just keen on enhancing your cybersecurity knowledge, this episode is packed with insights to fortify your defenses.
In this episode of the InfosecTrain podcast, we explore Privileged Access Management (PAM), a critical component of any robust cybersecurity strategy. PAM is designed to control and monitor access to an organization's most sensitive information and systems by managing privileged accounts, which are often targeted by cyber attackers. Our experts will explain what PAM is, why it's essential, and how implementing effective PAM solutions can help prevent data breaches, ensure compliance, and protect your organization's most valuable assets. Whether you're a cybersecurity professional, IT administrator, or business leader, this episode will provide you with a comprehensive understanding of PAM and practical steps to enhance your security posture. Tune in to learn how PAM can safeguard your organization from internal and external threats!
In this Brand Story episode as part of the Black Hat Event Coverage featuring Sean Martin and Marco Ciappelli, guest Art Poghosyan, co-founder of Britive, discusses the evolution and challenges of identity and access management (IAM) in the modern technological landscape. Sean and Marco engage Art in a conversation that covers everything from the significance of effective IAM for businesses to the innovative solutions Britive is bringing to the market.Art shares the story behind the foundation of Britive and its journey from conception to a leading provider of cloud-native privileged access management solutions. He highlights the shift from static to dynamic identities, emphasizing the importance of automating and authorizing access in real time to meet the needs of modern DevOps and cloud environments.The conversation also touches on how traditional security measures are adapting to new cloud-based infrastructures, highlighting the growing complexity and necessity for advanced IAM solutions. Marco brings in a critical perspective on the changing nature of technology and security, questioning how modern companies can sustain their operations amid rapid technological changes.Art shares insight into the convergence of new ideas and the maturity of contemporary technologies, suggesting that today's advancements provide unique opportunities for innovative solutions. Sean and Marco steer the conversation to practical applications, with Art providing real-world examples of how Britive's technologies are being implemented by enterprises facing complex security challenges. He explains how Britive's API-first approach aids in operationalizing security without imposing on performance or user experience.Furthermore, the episode sets the stage for an upcoming deeper conversation at the Black Hat event, where Art, Sean, and Marco will continue exploring IAM and the critical role Britive plays in shaping the industry's future. Listeners also get information on how to connect with Art and the Britive team at the event.Learn more about Britive: https://itspm.ag/britive-3fa6Note: This story contains promotional content. Learn more.Guest: Art Poghosyan, Co-Founder, Britive [@britive1]On LinkedIn | https://www.linkedin.com/in/artyompoghosyan/ResourcesCloud PAM: https://itspm.ag/britivxya3Learn more and catch more stories from Britive: https://www.itspmagazine.com/directory/britiveView all of our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this Brand Story episode as part of the Black Hat Event Coverage featuring Sean Martin and Marco Ciappelli, guest Art Poghosyan, co-founder of Britive, discusses the evolution and challenges of identity and access management (IAM) in the modern technological landscape. Sean and Marco engage Art in a conversation that covers everything from the significance of effective IAM for businesses to the innovative solutions Britive is bringing to the market.Art shares the story behind the foundation of Britive and its journey from conception to a leading provider of cloud-native privileged access management solutions. He highlights the shift from static to dynamic identities, emphasizing the importance of automating and authorizing access in real time to meet the needs of modern DevOps and cloud environments.The conversation also touches on how traditional security measures are adapting to new cloud-based infrastructures, highlighting the growing complexity and necessity for advanced IAM solutions. Marco brings in a critical perspective on the changing nature of technology and security, questioning how modern companies can sustain their operations amid rapid technological changes.Art shares insight into the convergence of new ideas and the maturity of contemporary technologies, suggesting that today's advancements provide unique opportunities for innovative solutions. Sean and Marco steer the conversation to practical applications, with Art providing real-world examples of how Britive's technologies are being implemented by enterprises facing complex security challenges. He explains how Britive's API-first approach aids in operationalizing security without imposing on performance or user experience.Furthermore, the episode sets the stage for an upcoming deeper conversation at the Black Hat event, where Art, Sean, and Marco will continue exploring IAM and the critical role Britive plays in shaping the industry's future. Listeners also get information on how to connect with Art and the Britive team at the event.Learn more about Britive: https://itspm.ag/britive-3fa6Note: This story contains promotional content. Learn more.Guest: Art Poghosyan, Co-Founder, Britive [@britive1]On LinkedIn | https://www.linkedin.com/in/artyompoghosyan/ResourcesCloud PAM: https://itspm.ag/britivxya3Learn more and catch more stories from Britive: https://www.itspmagazine.com/directory/britiveView all of our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this episode of the 'Identity at the Center' podcast, Jeff and Jim discuss the complexities of managing Privileged Access Management (PAM) and the challenges of balancing various responsibilities like real jobs, podcasting, and attending conferences. They highlight upcoming conferences like Identity Week America and the Authenticate conference, offering discount codes for listeners. The main guest, Michiel Stoop, Director of Identity Management at Philips, shares insights on the importance of PAM, the process of selling PAM initiatives to management, and the integration of technology in identity and access management. The episode also covers methodologies for selecting the right PAM products and strategies for minimizing attack surfaces. To end on a lighter note, the hosts discuss must-try activities and foods in the Netherlands. 00:00 Introduction and Hosts' Banter 01:26 Balancing Work and Podcasting 03:04 Upcoming Conferences and Discount Codes 05:30 Introducing the Guest: Mihiel Stoep 08:04 Philips' Focus on Health Technology 10:12 Understanding Privileged Access Management 23:18 Discussing Privileged Access Management 24:10 Stakeholder Management in IAM 25:00 Operational Models for PAM 28:08 Adapting PAM Strategies for Cloud 32:25 Selecting the Right PAM Technology 36:15 Future of Privileged Access Management 39:38 Exploring the Netherlands 42:57 Wrapping Up and Contact Information Connect with Michiel: https://www.linkedin.com/in/macstoop/ Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Authenticate Conference - Use code IDAC15 for 15% off: https://authenticatecon.com/event/authenticate-2024-conference/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.
In this engaging episode, hosts Jim McDonald and Jeff Steadman wrap up their Identiverse 2024 experience with a thought-provoking panel discussion. Joined by Alex Bovee, CEO and Co-Founder of ConductorOne; Ian Glazer, Founder and President of Weave Identity; and Lance Peterman, Identity Lead at Dick's Sporting Goods and Professor at UNC Charlotte, the conversation dives deep into the future of identity management. The panel explores the concept of Zero Standing Privileges (ZSP) as the evolution of least privilege, discussing its feasibility, operational challenges, and the maturity curve required for organizations to adopt such a model. Ian shares his perspective on the future of identity governance, while Alex and Lance provide insights into practical implementations and the role of automation in achieving ZSP. The discussion also touches on the importance of context, policy, and the need for better data orchestration to make identity management more effective. Tune in for an insightful conversation on the next frontier of identity management and the steps needed to get there. Connect with Alex Bovee - https://www.linkedin.com/in/alexbovee/ Learn about ConductorOne - https://www.conductorone.com/?utm_source=identityatthecenter&utm_medium=podcast&utm_campaign=c1-brand Connect with Ian: https://www.linkedin.com/in/iglazer/ Learn about Weave Identity - https://weaveidentity.com/ Connect with Lance - https://www.linkedin.com/in/lancepeterman/ Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Europe: https://www.terrapinn.com/exhibition/identity-week/ America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast
Crystal Trawny is the Practice Director at Optiv. In this episode, she joins host Melissa O'Leary to discuss privileged access management, or PAM, including some of the pressing challenges that businesses face today, why post-integration is so important to the process, and more. Cybersecurity In Perspective is a Cybercrime Magazine podcast series brought to you by Optiv. The cyber advisory and solutions leader, Optiv mitigates risk, accelerates potential, and centers every solution not just on your vulnerabilities, but your vision. To learn more about our sponsor, visit https://optiv.com.
Send us a Text Message.Keeper Security, a leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, introduced two major privileged access capabilities now available in the Keeper platform: Time-Limited Access and Self-Destructing Records. Designed for encrypted record access and sharing, these features provide new methods to quickly and securely elevate access and revoke access rights after they have been granted – vastly reducing the gradual accumulation of unnecessary privileges and reducing the potential attack surface for organizations.Marcia Dempster, VP of Channel Sales, Americas, and Craig Lurey, co-founder and CTO of Keeper Security, provided an overview of Keeper Security's offerings, and the concept of zero trust and its application in their product, emphasizing the importance of providing access and control over infrastructure while maintaining security. They also discussed the importance of cybersecurity and the concept of self-destructing records, which allows for secure sharing of sensitive information.
In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of the company's 25th anniversary. They discuss that milestone and reflect on CyberArk's growth to becoming the global leader in identity security and the ever-evolving threat landscape – and how the company has scaled to meet it. Udi shares his insights on the company's culture, values, philosophies and lessons he has learned. He also dives into the importance of innovation, the role of AI in cybersecurity and his future aspirations for the company. And, because we say in the episode that we'll share it here, Mark Knopfler's new album is entitled ‘One Deep River' … Udi describes it as great for driving and optimistic. Enjoy the podcast!
Our guest Lee Elliot, Director of Solutions Engineering at BeyondTrust, and our host IAM Architect Arne Vedø-Hansen, explore how PAM plays a crucial role in mitigating new and emerging threats, securing infrastructure, and safeguarding identity architecture. Hosted on Acast. See acast.com/privacy for more information.
In an era where cyber threats are evolving with unprecedented speed and sophistication, safeguarding privileged access within an organization's IT environment has never been more critical. InfosecTrain is thrilled to announce an exclusive session, "Mastering CyberArk: What is Privileged Access Management (PAM)?", designed to equip IT professionals, security enthusiasts, and anyone interested in cybersecurity with the knowledge and skills to implement and manage a robust PAM strategy using CyberArk, the leader in privileged access management. ➡️ Agenda for the Session ✔ Introduction to Privileged Accesses ✔ Risks Associated with Privileged Accounts ✔ Requirements of a PAM Solution ✔ Overview of Course Content ✔ Q/A Session
Zach talks with Chief Security Officer, Andrew Wilder, about what he calls the "beauty and the beast" of GenAI, especially as it relates to cyber security. Andrew comes from a place of neutrality, addressing the good, the bad, and the ugly of leveraging Generative AI in enterprises. He and Zach dive into it all in this episode. Like and Subscribe on YouTube (https://www.youtube.com/channel/UCAIUNkXmnAPgLWnqUDpUGAQ), Spotify, and Apple Podcasts. Follow us on LinkedIn (https://www.linkedin.com/company/keyhole-software) and Twitter (@KeyholeSoftware). Find even more Keyhole content on our website (https://keyholesoftware.com/). About Andrew: Andrew has a broad range of Cybersecurity, Risk Management, Audit, Merger & Acquisition, Organizational Design, and International experience cultivated over more than two decades across the Consumer Packaged Goods, Manufacturing, Financial Services, Logistics, Healthcare and Consulting industries. He has architected multiple strategic reorganizations in North America, Latin America, Europe, and Asia driving savings of more than 100 million dollars in bottom line cost. He has created and led global programs for Cybersecurity Risk Quantification, ISO 27001 (ISMS), Security Awareness, Cloud Security Architecture, Vulnerability Management, Security Operations (SOC / SIEM), Incident Response, Asset Management, Digital Security / DevSecOps, Data Privacy, Identity and Access Management, OT/IOT/IIOT Security, Privileged Access Management, Network Security, and Vendor Risk / 3rd Party Risk Management.
Crystal Trawny, Optiv's Practice Director, Privileged Account and Endpoint Privilege Management (PAM/EPM), joins host David Puner in exploring the ever-evolving identity landscape and how emerging threats impact organizations' cybersecurity requirements. Through the eyes of an end user, Trawny shares best practices for overcoming change resistance, creating effective deployment timelines and avoiding scope creep. This episode maps the correlation between critical program elements – such as robust endpoint privilege management and dynamic access controls – and privileged access management (PAM) maturity. In the face of complexity and ransomware, insider threats and other sophisticated cyberattacks, organizations can use these insights to help assess their current strategy and chart a course for success.
Oklo going public through SPAC merger, JPMorgan hires Silicon Valley Bank veteran for startup focus, Morgan Stanley recruits JPMorgan banker for M&A division, Jamie Dimon's ambitious goals for JPMorgan's new headquarters, US startup Venus developing high-speed plane engine, Spotify CEO raises $60M for healthcare startup, Google's augmented reality team faces changes, GlobalFoundries' incoming CFO departs, Delinea recognized as leader in Privileged Access Management market.
Darren Guccione, CEO and Co-founder of Keeper Security, continues his talk with Don Witt of the Channel Daily News, a TR publication in Part 2 where Darren continues his discussion about Privileged Access Solutions (PAM). He describes how traditional PAM solutions are falling short, and what IT pros need to do when it comes to Privileged Access Management. Darren also describes how Keeper Security excels at PAM. Darren Guccione Darren provides advice to organizations struggling with identity and access security. He finishes with future goals and what the company is currently focused on for release soon. If you are concerned about security, lock down the corporate and enterprise passwords. By doing this alone, 80% of the threats will be neutralized. Keeper Security is one powerful platform that protects every user on every device. Deploys in just minutes. Protecting millions of people and thousands of companies globally as the trusted and proven cybersecurity leader. An easy-to-use platform that unifies critical components of Identity and Access Management and enables zero-trust transformation. Visibility, security and control - Keeper's platform gives administrators the power to fine tune their organization's access levels to critical data and credentials across individuals and teams. Keeper uses role-based access control (RBAC) to support least-privileged access and tracks all user activity from every location and on every device. For more information, go to: https://www.keepersecurity.com
Keeper Security's next-gen privileged access management, or PAM, solution delivers enterprise-grade password, secrets and privileged connection management in one unified platform. Not only is it fast and easy to deploy, but Keeper's patented PAM solution enables organizations to achieve complete visibility, security, control and reporting across every privileged user on every device within the organization. Learn more at https://keepersecurity.com
In this episode, Matthias is joined by Paul Fisher to delve deeper into the sub-series on Trends and Predictions for 2023 and beyond. The world is constantly evolving and a lot has changed and is still changing in the PAM market, which is expanding and undergoing significant transformation. Paul offers insights on the current trends for Privileged Access Management, the significance of CIEM, and the impact of mergers and new players in this crucial market segment. All things PAM: Leadership Compass: https://www.kuppingercole.com/research/lc81111/privileged-access-management Webinar: https://www.kuppingercole.com/events/2023/04/welcome-to-pamocracy Paul’s Session at EIC: https://www.kuppingercole.com/sessions/5334/1
In this episode, Matthias is joined by Paul Fisher to delve deeper into the sub-series on Trends and Predictions for 2023 and beyond. The world is constantly evolving and a lot has changed and is still changing in the PAM market, which is expanding and undergoing significant transformation. Paul offers insights on the current trends for Privileged Access Management, the significance of CIEM, and the impact of mergers and new players in this crucial market segment. All things PAM: Leadership Compass: https://www.kuppingercole.com/research/lc81111/privileged-access-management Webinar: https://www.kuppingercole.com/events/2023/04/welcome-to-pamocracy Paul’s Session at EIC: https://www.kuppingercole.com/sessions/5334/1
Im Podcast c't uplink sprechen wir zuerst über ein Titelthema der c't 7/2023: günstige Smartphones und Featurephones. Wir haben Android-Smartphones von 150 bis 220 Euro getestet und Telefone unter 100 Euro -- die so genannten Featurephones. Die c't-Redakteure Robin Brand und Steffen Herget erklären, welche Erwartungen die Telefone erfüllen und wofür doch etwas mehr Geld notwendig ist. Im zweiten Teil berichten wir über Smartphone-Neuheiten für 2023: rollbare Displays, Satelliten-Smartphones und neue High-End-Handys. Die Kollegen Robin Brand, Daniel Herbig und Steffen Herget haben die Fachmesse Mobile World Congress (MWC) in Barcelona besucht und berichten von ihren Entdeckungen. Zum Smartphone-Test traten fünf Android-Geräte zwischen 150 und 220 Euro an. Sie punkten mit langen Laufzeiten, einige zudem mit gutem Display und einer langen Versorgung mit Sicherheitsupdates. Wo die Geräte an ihre Grenzen kommen, und welche Aufgaben sie gut erledigen, erläutern wir im Podcast. Zudem haben wir sechs Featurephones getestet. Sparen auf jeden Fall Geld, doch wie bedient man sie und was können sie? Einige laufen unter KaiOS, einem Mobilbetriebssystem, für das es sogar nachinstallierbare Apps gibt. Wir diskutieren, ob solche Geräte beispielsweise für Senioren geeignet sind, für Kinder, oder als Zweitgerät. Auf dem MWC haben die Kollegen ein Smartphone mit rollbarem Display von Lenovo begutachtet. Wir erklären, was da genau rollt und ob das Roll-Phone eine sinnvolle Alternative zu den bisherigen Falt-Smartphones darstellen könnte. Handyhersteller Bullit Group und Chiphersteller Mediatek haben einen kleinen Satellten-Empfänger gezeigt, mit dem per Bluetooth jedes Handy per Satellit Kontakt aufnehmen kann. Eine zweite neue Handy-Satellitenanbindung zeigte Qualcomm in einem neuen Snapdragon-SoC. Wir erklären die Unterschiede der Konzepte und vergleichen mit Apples Satellitenanbindung des iPhone 14 -- und geben einen Ausblick auf 5G-Satellitenkommunikation. Das neue High-End-Smartphone Xiaomi 13 will mit besonders guter Kamera in Zusammenarbeit mit Leica punkten. c't hatten vorab mit den Entwicklern geredet und auch den Haupt-Konkurrent Samsung Galaxy S23 im Fotolabor, sodass wir eine erste Einschätzung wagen können. Und schließlich haben die Kollegen auf dem MWC ein reparierbares Smartphone von Nokia gesehen -- und Foldables vermisst. In unserem YouTube-Kanal finden Sie diese Folge zweigeteilt, die Featurephones/Billigsmartphones (Folge 47.4b) seit Samstag Morgen, die MWC-News (Folge 47.4a) seit Donnerstag. ***SPONSOR-HINWEIS*** CyberArk (NASDAQ: CYBR) ist das weltweit führende Unternehmen im Bereich Identity Security. Mit dem Privileged Access Management als Kernkomponente bietet CyberArk eine umfassende Sicherheit für jede – menschliche oder nicht-menschliche – Identität über Business-Applikationen, verteilte Arbeitsumgebungen, Hybrid-Cloud-Workloads und DevOps-Lifecycles hinweg. www.cyberark.de ***SPONSOR-HINWEIS ENDE***
Im Podcast c't uplink sprechen wir zuerst über ein Titelthema der c't 7/2023: günstige Smartphones und Featurephones. Wir haben Android-Smartphones von 150 bis 220 Euro getestet und Telefone unter 100 Euro -- die so genannten Featurephones. Die c't-Redakteure Robin Brand und Steffen Herget erklären, welche Erwartungen die Telefone erfüllen und wofür doch etwas mehr Geld notwendig ist. Im zweiten Teil berichten wir über Smartphone-Neuheiten für 2023: rollbare Displays, Satelliten-Smartphones und neue High-End-Handys. Die Kollegen Robin Brand, Daniel Herbig und Steffen Herget haben die Fachmesse Mobile World Congress (MWC) in Barcelona besucht und berichten von ihren Entdeckungen. Zum Smartphone-Test traten fünf Android-Geräte zwischen 150 und 220 Euro an. Sie punkten mit langen Laufzeiten, einige zudem mit gutem Display und einer langen Versorgung mit Sicherheitsupdates. Wo die Geräte an ihre Grenzen kommen, und welche Aufgaben sie gut erledigen, erläutern wir im Podcast. Zudem haben wir sechs Featurephones getestet. Sparen auf jeden Fall Geld, doch wie bedient man sie und was können sie? Einige laufen unter KaiOS, einem Mobilbetriebssystem, für das es sogar nachinstallierbare Apps gibt. Wir diskutieren, ob solche Geräte beispielsweise für Senioren geeignet sind, für Kinder, oder als Zweitgerät. Auf dem MWC haben die Kollegen ein Smartphone mit rollbarem Display von Lenovo begutachtet. Wir erklären, was da genau rollt und ob das Roll-Phone eine sinnvolle Alternative zu den bisherigen Falt-Smartphones darstellen könnte. Handyhersteller Bullit Group und Chiphersteller Mediatek haben einen kleinen Satellten-Empfänger gezeigt, mit dem per Bluetooth jedes Handy per Satellit Kontakt aufnehmen kann. Eine zweite neue Handy-Satellitenanbindung zeigte Qualcomm in einem neuen Snapdragon-SoC. Wir erklären die Unterschiede der Konzepte und vergleichen mit Apples Satellitenanbindung des iPhone 14 -- und geben einen Ausblick auf 5G-Satellitenkommunikation. Das neue High-End-Smartphone Xiaomi 13 will mit besonders guter Kamera in Zusammenarbeit mit Leica punkten. c't hatten vorab mit den Entwicklern geredet und auch den Haupt-Konkurrent Samsung Galaxy S23 im Fotolabor, sodass wir eine erste Einschätzung wagen können. Und schließlich haben die Kollegen auf dem MWC ein reparierbares Smartphone von Nokia gesehen -- und Foldables vermisst. In unserem YouTube-Kanal finden Sie diese Folge zweigeteilt, die Featurephones/Billigsmartphones (Folge 47.4b) seit Samstag Morgen, die MWC-News (Folge 47.4a) seit Donnerstag. ***SPONSOR-HINWEIS*** CyberArk (NASDAQ: CYBR) ist das weltweit führende Unternehmen im Bereich Identity Security. Mit dem Privileged Access Management als Kernkomponente bietet CyberArk eine umfassende Sicherheit für jede – menschliche oder nicht-menschliche – Identität über Business-Applikationen, verteilte Arbeitsumgebungen, Hybrid-Cloud-Workloads und DevOps-Lifecycles hinweg. www.cyberark.de ***SPONSOR-HINWEIS ENDE***
Im Podcast c't uplink sprechen wir zuerst über ein Titelthema der c't 7/2023: günstige Smartphones und Featurephones. Wir haben Android-Smartphones von 150 bis 220 Euro getestet und Telefone unter 100 Euro -- die so genannten Featurephones. Die c't-Redakteure Robin Brand und Steffen Herget erklären, welche Erwartungen die Telefone erfüllen und wofür doch etwas mehr Geld notwendig ist. Im zweiten Teil berichten wir über Smartphone-Neuheiten für 2023: rollbare Displays, Satelliten-Smartphones und neue High-End-Handys. Die Kollegen Robin Brand, Daniel Herbig und Steffen Herget haben die Fachmesse Mobile World Congress (MWC) in Barcelona besucht und berichten von ihren Entdeckungen. Zum Smartphone-Test traten fünf Android-Geräte zwischen 150 und 220 Euro an. Sie punkten mit langen Laufzeiten, einige zudem mit gutem Display und einer langen Versorgung mit Sicherheitsupdates. Wo die Geräte an ihre Grenzen kommen, und welche Aufgaben sie gut erledigen, erläutern wir im Podcast. Zudem haben wir sechs Featurephones getestet. Sparen auf jeden Fall Geld, doch wie bedient man sie und was können sie? Einige laufen unter KaiOS, einem Mobilbetriebssystem, für das es sogar nachinstallierbare Apps gibt. Wir diskutieren, ob solche Geräte beispielsweise für Senioren geeignet sind, für Kinder, oder als Zweitgerät. Auf dem MWC haben die Kollegen ein Smartphone mit rollbarem Display von Lenovo begutachtet. Wir erklären, was da genau rollt und ob das Roll-Phone eine sinnvolle Alternative zu den bisherigen Falt-Smartphones darstellen könnte. Handyhersteller Bullit Group und Chiphersteller Mediatek haben einen kleinen Satellten-Empfänger gezeigt, mit dem per Bluetooth jedes Handy per Satellit Kontakt aufnehmen kann. Eine zweite neue Handy-Satellitenanbindung zeigte Qualcomm in einem neuen Snapdragon-SoC. Wir erklären die Unterschiede der Konzepte und vergleichen mit Apples Satellitenanbindung des iPhone 14 -- und geben einen Ausblick auf 5G-Satellitenkommunikation. Das neue High-End-Smartphone Xiaomi 13 will mit besonders guter Kamera in Zusammenarbeit mit Leica punkten. c't hatten vorab mit den Entwicklern geredet und auch den Haupt-Konkurrent Samsung Galaxy S23 im Fotolabor, sodass wir eine erste Einschätzung wagen können. Und schließlich haben die Kollegen auf dem MWC ein reparierbares Smartphone von Nokia gesehen -- und Foldables vermisst. In unserem YouTube-Kanal finden Sie diese Folge zweigeteilt, die Featurephones/Billigsmartphones (Folge 47.4b) seit Samstag Morgen, die MWC-News (Folge 47.4a) seit Donnerstag. ***SPONSOR-HINWEIS*** CyberArk (NASDAQ: CYBR) ist das weltweit führende Unternehmen im Bereich Identity Security. Mit dem Privileged Access Management als Kernkomponente bietet CyberArk eine umfassende Sicherheit für jede – menschliche oder nicht-menschliche – Identität über Business-Applikationen, verteilte Arbeitsumgebungen, Hybrid-Cloud-Workloads und DevOps-Lifecycles hinweg. www.cyberark.de ***SPONSOR-HINWEIS ENDE***
Privileged Access Management (PAM) is a security practice that involves controlling and monitoring access to privileged accounts, which are accounts with administrative or high-level access to systems, applications, and data. #privilegedaccessmanagement #pam #privilegedaccessmanagementtools #privilegedaccessmanagementsolution #privilegedaccess #cybersecurity #identitysecurity #whatisprivilegedaccessmanagement #pamprivilegedaccessmanagement #privilegedidentitymanagement #infosectrain Thank you for watching this video, For more details or free demo with out expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar
How do you improve the security of your organization? Richard talks to Jess Dodson about the current security environment we're living in and what you can do to improve your security posture. Jess talks about how breaches happen and what you can do to detect them early before things get worse. The conversation dives into getting more resources - in most cases, improving security means having the time to work on preventative measures, like implementing multi-factor authentication, security information and event management, and setting up Just Enough Administration. And you need the time to review the activities in your network to let you stop a breach before it turns into something worse!Links:Privileged Identity ManagementJust Enough AdministrationMicrosoft SentinelLocal Administrator Password SolutionRecorded January 20, 2023
Even if you've been living under a super-sized rock for the last few months, you've probably heard of ChatGPT. It's an AI-powered chatbot and it's impressive. It's performing better on exams than MBA students. It can debug code and write software. It can write social media posts and emails. Users around the globe are clearly finding it compelling. And the repercussions – good and bad – have the potential to be monumental. That's where today's guest Eran Shimony, Principal Security Researcher for CyberArk Labs, comes into the picture. In fact, in an effort to stay ahead of the bad guys, Eran recently had ChatGPT create polymorphic malware. In conversation with host David Puner, he helps us understand if we are collectively prepared to deal with ChatGPT and the implications it may have for cyber threats. How'd did he get ChatGPT to do this and what are the implications? Listen in to find out. If you find this episode interesting, be sure to check out Eran's recent blog post on the CyberArk Threat Research blog: https://www.cyberark.com/chatgpt-blog
In this episode of the Trust Issues podcast, host David Puner interviews Nigel Miller, Director of Security Operations and Engineering at Maximus, a company that provides process management and tech solutions to help governments improve their health and human service programs. Nigel discusses his role in keeping the company's nearly 40,000 employees cyber-trained and secure. And, as you'll hear, Nigel highlights the similarities between football and cybersecurity and that understanding one's opponent and environment is crucial to success in both.
The PAM market is changing and expanding. Paul Fisher talks about the latest trends for Privileged Access Management, the role of CIEM, mergers and newcomers in this important market segment.
The PAM market is changing and expanding. Paul Fisher talks about the latest trends for Privileged Access Management, the role of CIEM, mergers and newcomers in this important market segment.
What are the new governance challenges in M365? Richard chats with Martina Grom about her ongoing work helping organizations provide governance over the growing surface area of Microsoft 365. Martina talks about the challenges around identity and multi-factor authentication and the improvements that Microsoft is making to MFA to make it easier for users to do the right thing. The conversation also turns to data loss prevention and the approaches to minimizing a company's legal exposure to data loss - starting with not storing data if you can avoid it! Martina also talks about the new challenges in governance with Power Apps, including the tools available to help sysadmins see what apps exist, how they touch data, and what privacy and security controls are in place. Governance is an ongoing effort!Links:Microsoft EntraPrivileged Identity ManagementPrivileged Access ManagementAzure PurviewData Loss PreventionCalifornia Consumer Privacy ActMicrosoft Power Platform Center of Excellence Starter KitPower Platform Usage InsightsChanges to Microsoft AuthenticatorMicrosoft Purview Insider RiskCollaboration GovernanceCloud Hub for EvergreeningAtWork BlogRecorded December 13, 2022
Welcome to another episode of The Identity Jedi Show, where we dive into the world of identity and access management, exploring the latest trends, news, and discussions. In this episode, we'll be focusing on the critical area of privileged access management (PAM), covering various aspects of implementation challenges and best practices to keep your organization secure. --- Send in a voice message: https://podcasters.spotify.com/pod/show/identityjedishow/message
Too often when we think of the human element in cybersecurity it's the insider threats. But more often it's the hardworking protectors inside the organization who, while passionate about their jobs, would rather work to live rather than live to work. Although that reality can easily flip due to the nature of the cyber world. That's where today's guest Omar Khawaja, who's been the CISO at Highmark Health for nine years, comes into the picture. As you'll hear, Khawaja's been on the cutting edge of cultivating talent and creating a cyber culture that empowers the human element of an organization with more than 37,000 employees. What you'll learn: How the power of language, relationships and story can be used to effectively communicate cybersecurity strategies and best practices with partners outside of the space. And how the benefits of this can lead to better culture, retention of talent and business growth.
Welcome back to the Identity Jedi Show, where we explore the latest trends and news in cybersecurity and identity management. In Episode 6, join host David Lee, The Identity Jedi, as he continues the series on Privileged Access Management (PAM) with special guest Lance Peterman. --- Send in a voice message: https://podcasters.spotify.com/pod/show/identityjedishow/message
In the spring of 2022, Costa Rica was hit with a series of large-scale, long-lasting ransomware attacks, which wreaked havoc on the government and healthcare system – and paralyzed imports and exports. The ripple effects were far-reaching and the economy was crippled. President Rodrigo Chaves declared a national state of emergency. Trust was shaken. On today's episode, Vinicio Chaves Alvarado, acting CISO at BAC Credomatic, the Costa Rica-based international bank, talks with host David Puner about being on the frontlines of stabilizing and building back trust. As he puts it, "We are not only cybersecurity professionals – we not only create cybersecurity controls or detect or react to threats. We create trust."
Being a Chief Information Security Officer is a tough job. CISOs are on the front lines, protecting against the unknown day after day, week after week. It's no wonder mental health issues such as depression and anxiety are surging in our industry. There are a lot of things that need to change, but on a positive note, this once-taboo subject is starting to get the attention it so desperately deserves. This is in part thanks to security leaders like Kirsten Davies, CISO at Unilever, stepping forward. On today's episode, host David Puner talks with Davies about some of her passions, including the humanization of the teams in our cybersecurity community. She's equally passionate about being an innovative cyber protector and finding solutions to the multitude of challenges high-level CISOs face on a daily basis. The timing of the episode is apropos because October is both Cybersecurity Awareness Month and Depression and Mental Health Awareness and Screening Month. Time to elevate this critical conversation, advocate against stigma, and bring awareness to the various resources available to those who need them.
Even when looking at layered enterprise solutions designed to thwart attacks and contain them, we must always go back to cybersecurity basics at the individual level. And that's what, on today's episode, guest Bryan Murphy, CyberArk's Senior Director of Architecture Services and Incident Response stops by to talk with host David Puner about. Murphy also dives into the importance of cyber hygiene as an essential preventive measure for protecting identities, as part of a defense-in-depth strategy. It's a perfect fit for October, which happens to be Cybersecurity Awareness Month (CSAM). Raise your awareness and give it a listen!
Privileged access management is an under appreciated security function that every organization needs. This episode talks about a real-world example where the lack of effective PAM led to an ex-employee sabotaging a network. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - https://www.patreon.com/SecurityInFive *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Mighty Mackenzie - https://www.facebook.com/mightymackie Where you can find Security In Five - https://linktr.ee/binaryblogger Email - bblogger@protonmail.com
U.S. government agencies are warning that ransomware actors are "disproportionately targeting the education sector," especially K-12. That's because sensitive student data, overworked staff and competing priorities make investing in cybersecurity talent and tools a major challenge. On today's episode, host David Puner checks in with Matt Kenslea, CyberArk's Director of State, Local and Education (SLED), for a discussion about these targeted cyberattacks, the challenges they pose – and what schools can do.
Len Noe – our favorite cyborg and CyberArk resident technical evangelist and white hat hacker – is back! On today's episode, he's talking with host David Puner about risky QR codes. On first blush it may seem like a simple subject, but attackers are having a field day with them and there seems to be a general lack of awareness about it. Help stop the havoc-wreaking and find out what you can do to protect yourself.
Sports, at their highest levels, are shaped by lifetimes dedicated to practicing, strategizing and anticipating. The same goes for cybersecurity. Although, in our world, it's not a game and there are no set parameters. On today's episode, host David Puner speaks with Clarence Hinton, CyberArk Chief Strategy Officer, Head of Corporate Development about looking into the future and preparing for the unknown. Like hockey, it's about skating to where the puck's going – not where it's been.
If you're in the business of collecting consumer data these days, you better be in the business of protecting that data. Or you could find yourself with no business. On today's episode, host David Puner talks with Thomas Tschersich, Chief Security Officer of Deutsche Telekom (parent company of T-Mobile) and Chief Technical Officer of Telekom Security, about the new rules of data privacy and protection and how telecommunication providers must live and breathe trust as they operate critical infrastructure.
For every me or you, there are now 45 machine identities. That's 45 machine identities for every single human identity, according to the CyberArk 2022 Identity Security Threat Landscape Report. And 68% of those machine identities have some level of sensitive access. Attackers know this, and are doing their best to take advantage of those odds. Host David Puner sits down with Udi Mokady, Founder, Chairman and CEO of CyberArk, shortly after the wrap of the company's Impact 2022 conference, for a talk about Identity Security – where CyberArk has been, where it's going – and a little about guitar playing too.
Cybersecurity is essential for your cloud-based businesses. Find out how the just-in-time privileged access management approach can help your company achieve zero standing permissions and prevent data breaches. Find out more at: https://www.britive.com/blog/privileged-access-management-gartner (https://www.britive.com/blog/privileged-access-management-gartner)
Jim and Jeff talk about the role of Privileged Access Management as the organizations shift more to the cloud for their infrastructure. Also, our favorite McDonald's orders. 99% of cloud identities are overly permissive, opening door to attackers: https://www.csoonline.com/article/3656793/99-of-cloud-identities-are-overly-permissive-misconfigured-iam-opening-door-to-attackers.html Connect with Jim and Jeff on LinkedIn here: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show at www.IdentityAtTheCenter.com, follow @IDACPodcast on Twitter, and check out our live streams at www.idac.live --- Send in a voice message: https://anchor.fm/identity-at-the-center/message
Trailer for CyberArk's Trust Issues™ podcast. Debuting spring 2022.
With us today is Derly Gutierrez, Head of Security at 1010 Data, and veteran. Derly is here with us today to talk about the journey to passwordless authentication and the flaws and strenghts of today's authentication methoods. Allan and Derly refer to studies and surveys about the problems with passwords and the challenges of implementing passwordless approaches. Derly emphasizes the need for other complementary technologies such as Role-Based Access Control (RBAC), Privileged Access Management (PAM), and system-to-system communications. The two discuss corporate and personal use of passwordless solutions, talk about legal precedence and the future of passwordless approaches. Key Takeaways 1:14 How Derly got into cyber 1:58 About Derly's day job as Head of Security 2:34 Allan quotes the 2017 Verizon DBIR on how many breaches involve weak or stolen passwords 3:35 Allan cites NIST 800-63b 4:15 Derly talks about CAC cards in the US DoD 4:50 Derly sides with vendor innovations over NIST guidance 5:56 Allan clarifies the distinction between PINs and passwords 6:52 Derly points out the flaws with biometrics in terms of reliability and assurance 9:09 Allan cites a survey regarding WHY organizations choose passwordless 9:52 How many 'passwordless' solutions still include shared secrets 10:38 Derly talks about corporate vs. personal passwordless solutions and shared secrets as backup for reliability issues 11:37 Derly emphasizes a lack of RBAC and PAM foiling all authentication approaches 13:06 Allan points out the value of Identity and Access Management solutions 13:44 Allan references three vendor approaches towards passwordless for legacy systems such as RADIUS 14:50 Derly takes these methods apart 16:05 Many companies are not doing Role-Based Acces Control, system-to-system communication and Privileged Access Management correctly 17:02 Allan brings up the presence of push attacks 17:38 Allan's definiton of true passwordless authentication 17:56 Derly's definition of true passwordless authentication 21:29 For personal use of biometrics, Allan brings up a disturbing precedent of law enforcement accessing an individual's phone with forced facial recognition 23:17 Derly emphasizes that applications on your phone should have a different authentication factor than access to the phone itself 23:47 "Your home is your castle" has become "Your phone is your castle" 25:06 Allan cites one last survey as to how many of us really are passwordless 26:02 How long before we got to passwordless? 28:06 What keeps Derly going in cyber Links: Learn more about Derly on LinkedIn and Twitter Follow Allan Alford on LinkedIn and Twitter Learn more about Hacker Valley Studio and The Cyber Ranch Podcast Sponsored by our good friends at Axonius
Today we're talking cloud security and work-from-home. If you've ever checked your work email on your personal phone – I know you have, because we've all done it! – or touched up some time-sensitive spreadsheets on the same ipad your kids use to play Animal Crossing, Terence Jackson, Chief Information Security & Privacy Officer of Thycotic, is going to tell you how to tighten up your security protocols to ensure that work-from-home doesn't become breach-from-home!– Enter code “cyberwork” to get 30 days of free training with Infosec Skills: https://www.infosecinstitute.com/skills/– View transcripts and additional episodes: https://www.infosecinstitute.com/podcastWith more than 17 years of public and private sector IT and security experience, Terence Jackson is responsible for protecting the company's information assets. In his role, he currently leads a corporate-wide information risk management program. He identifies, evaluates and reports on information security practices, controls and risks in order to comply with regulatory requirements and to align with the risk posture of the enterprise. Prior to joining Thycotic, Terence was the Director of Cybersecurity and Professional Services for TSI, a Virginia based Inc. 5000 company. He has also worked as a Senior Security Consultant for Clango, Inc., a top Identity and Access Management (IAM) consultancy. He was featured in and also was a contributor to the book “Tribe of Hackers.”About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.