POPULARITY
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com How do you defend your website against an attack that can reach one hundred million requests a second? The federal government is in an unusual position: in addition to the "garden variety" attacks, such as phishing and ransomware, it is also subject to political attacks with a specific agenda. Ostensibly, they do not have financial motivation; their motivation is a political statement. Welcome to hacktivism. The tool they use is a tried-and-true, good, old-fashioned Distributed Denial of Service (DDoS) attack. If you consult your history books and shake off the dust, you will find that the first DDoS attack was recognized in 1996. Advances in cloud computing and AI have been a force multiplier for malicious actors to shut down websites. In the past, the attacker would remain anonymous; not today. Today's hacktivist often claims responsibility for the attack and publicize their demands. It has gotten to the point where DDoS attacks are available to consumers as DDoS-as-a-service. Pascal Geenes has authored an article about a particularly nasty DDoS attack, appropriately called "DieNet." It attempts to instill doubt and chaos in a federal site. What is the defense? Pascal Geenes has identified vulnerabilities in APIs as a key attack vector. Many federal agencies are not aware of their API inventory. It is possible to scan a federal site, identify a flaw in an unused API, and leverage that knowledge to launch a DDoS attack. Radware's solutions, including AI-driven security, help mitigate these attacks quickly, reducing the mean time to resolution (MTTR). Heenan emphasizes the importance of being initiative-taking in cybersecurity. = = =
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO. We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features? This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2: Weekly Enterprise News In this week's enterprise security news, Agents replacing analysis is highly misunderstood only one funding round Orca acquires Opus to automate remediation OneDrive is updating to make BYOD worse? Companies are starting to regret replacing workers with AI Is venture capital hanging on by a thread (made of AI)? Potential disruption in the traditional vuln mgmt space! MCP is already looking like a dumpster fire from a security perspective malicious NPM packages and, IS ALCHEMY REAL? Segment 3: RSAC Conference 2025 Interviews Interview 1: Pluralsight Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats. Pluralsight's AI Skills Report This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats! Interview 2: Radware Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks. This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-407
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO. We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features? This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2: Weekly Enterprise News In this week's enterprise security news, Agents replacing analysis is highly misunderstood only one funding round Orca acquires Opus to automate remediation OneDrive is updating to make BYOD worse? Companies are starting to regret replacing workers with AI Is venture capital hanging on by a thread (made of AI)? Potential disruption in the traditional vuln mgmt space! MCP is already looking like a dumpster fire from a security perspective malicious NPM packages and, IS ALCHEMY REAL? Segment 3: RSAC Conference 2025 Interviews Interview 1: Pluralsight Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats. Pluralsight's AI Skills Report This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats! Interview 2: Radware Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks. This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-407
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO. We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features? This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2: Weekly Enterprise News In this week's enterprise security news, Agents replacing analysis is highly misunderstood only one funding round Orca acquires Opus to automate remediation OneDrive is updating to make BYOD worse? Companies are starting to regret replacing workers with AI Is venture capital hanging on by a thread (made of AI)? Potential disruption in the traditional vuln mgmt space! MCP is already looking like a dumpster fire from a security perspective malicious NPM packages and, IS ALCHEMY REAL? Segment 3: RSAC Conference 2025 Interviews Interview 1: Pluralsight Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats. Pluralsight's AI Skills Report This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats! Interview 2: Radware Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks. This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them! Show Notes: https://securityweekly.com/esw-407
Radware says recently WAF bypasses were patched in 2023 Marks & Spencer confirms data stolen in ransomware attack Alabama suffers cybersecurity event Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com
The following article of the Tech industry is: “Scam-tastic: A Business Journey into Digital Deception, Fraud” by Oscar Montes, Country Manager, Radware.
On this special episode Dr. Nick recorded live at HIMSS25 with 2 guests. Bevey Miner, EVP Healthcare Strategy and Policy at Consensus Cloud Solutions and Neal Quinn, Head of Cloud Security, North America at Radware. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
In this videocast, KuppingerCole Analysts' Senior Analyst Warwick Ashford is joined by Prakash Sinha, Senior Director and Technology Evangelist at Radware, to explore how security teams can drive Mean Time To Resolution (MTTR) close to zero. As AI-powered attacks increase in sophistication and frequency, security operations centers (SOCs) must evolve by leveraging automation and AI-driven incident response. Prakash shares insights on how AI can enhance threat detection, automate remediation, and reduce analyst workloads while maintaining governance and accountability. Discover practical steps for implementing AI-assisted security and the key success factors for modernizing SOCs in the face of an ever-changing threat landscape.
In this videocast, KuppingerCole Analysts' Senior Analyst Warwick Ashford is joined by Prakash Sinha, Senior Director and Technology Evangelist at Radware, to explore how security teams can drive Mean Time To Resolution (MTTR) close to zero. As AI-powered attacks increase in sophistication and frequency, security operations centers (SOCs) must evolve by leveraging automation and AI-driven incident response. Prakash shares insights on how AI can enhance threat detection, automate remediation, and reduce analyst workloads while maintaining governance and accountability. Discover practical steps for implementing AI-assisted security and the key success factors for modernizing SOCs in the face of an ever-changing threat landscape.
Big thanks to Radware for sponsoring this video and sharing technical insights with us! // Radware reports REFERENCE // Executive Summary: https://davidbombal.wiki/2025threats 2025 Global Threat Analysis Report: https://davidbombal.wiki/2025threatsu... // Pascal Geenens' SOCIAL // LinkedIn: / geenensp Website: https://www.radware.com/ // Radware SOCIAL // YouTube: / radwareinc Webinars: https://www.radware.com/newsroom/events/ LinkedIn / radware // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:03 - Intro 01:40 - What are the Reports About? 06:59 - Hacktivists (Dark Storm Team) 10:19 - DDos For Hire (Telegram) 13:24 - Check-Host.net 14:27 - Dienet 19:44 - How to Bring Down a Website 21:46 - DNS DDoS Attacks 26:28 - HTTP/2 29:22 - Botnet Capability 31:51 - Noname057 35:09 - Home Routers (TRS-069) 39:05 - Bullet Proof Cloud Services 45:13 - Vulnerable IoT 49:04 - Shodan (IoT Search Engine) 50:07 - Downloading Threats 52:45 - Application Programming Interfaces (APIs) 57:15 - Artificial Intelligence (AI) 01:06:49 - The Fight Against Bad AI 01:08:49 - How to Protect Yourself 01:14:52 - What is Radware? 01:16:00 - The Struggle of Downloading Models 01:20:06 - Should AI Keep your Data? 01:22:01 Connect with Pascal 01:22:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Felix Lee shares how ADPList is democratising mentorship, the lessons he's learned from failure and resilience, and why clarity beats cleverness in design. Highlights include: 02:14 - How did you come to own uber.com? 15:27 - What does performance have to do with UX? 28:54 - How do you identify the best executive champion for performance? 35:24 - Is measuring the business impact of performance as easy as it sounds? 46:37 - Why aren't designers more involved in performance? ====== Who is Tammy Everts? Tammy is the Chief Experience Officer at SpeedCurve—a platform that enables organisations to unlock the full potential of their web performance. In her role, Tammy champions the connection between site speed, user experience, and business success, working closely with customers to deepen their understanding of how people use with their websites. Tammy's career journey also includes senior UX roles at Soasta and Radware, and over two decades of pioneering research involving EEG headsets, facial action coding, and advanced machine learning. She is the author of “Time is Money: The Business Value of Web Performance” and a sought-after speaker, having shared her expertise at prominent events like Chrome Dev Summit, Smashing Conference, and Beyond Tellerand. Tammy also co-chairs the annual performance.now() conference in Amsterdam and co-curates WPO Stats, a valuable resource of web performance case studies. Find Tammy here: LinkedIn: https://www.linkedin.com/in/tammyeverts/ Website: https://tammyeverts.wordpress.com/ Mastodon: https://webperf.social/@tammy X: https://x.com/tameverts ====== Subscribe to Brave UX Liked what you heard and want to hear more? Subscribe and support the show by leaving a review on Apple Podcasts (or wherever you listen). Apple Podcast Spotify YouTube Podbean Follow us on our other social channels for more great Brave UX content! LinkedIn TikTok Instagram Brendan Jarvis hosts the Show, and you can find him here: Brendan Jarvis on LinkedIn The Space InBetween Website
EPISODE 100! In this milestone episode, Patrick and Ciprian are thrilled to welcome back Richard Campbell for a fascinating discussion that dives deep into the world of quantum advancements and scientific exploration. Together, they explore the mysterious Majorana Fermion, the allure of Cold Fusion, the lessons from refuted papers, and the solutions and innovations that have reshaped the industry. Join us as we celebrate 100 episodes of thought-provoking insights and look ahead to the future of quantum technology! Richard Campbell wrote his first line of code in 1977. His career has spanned the computing industry both on the hardware and software sides, development and operations. He was a co-founder of Strangeloop Networks, acquired by Radware in 2013, and was on the board of directors of Telerik that was acquired by Progress Software in 2014. Today he is a consultant and advisor to several successful technology firms and is the founder and chairman of Humanitarian Toolbox (www.htbox.org), a public charity that builds open-source software for disaster relief. Richard is the host of two podcasts: .NET Rocks! (www.dotnetrocks.com) the Internet Audio Talkshow for .NET developers and RunAs Radio (www.runasradio.com), a weekly show for IT Professionals. He also produces the DevIntersection (www.devintersection.com) series of conferences.
The following article of the tech industry is: “API: A Problematic Interface?” by Oscar Montes, Country Manager at Radware
What Industry Leading ISPs are Saying about Upping their Security Game, Podcast with Radware's Travis Volk, Podcast, Automation is driving down the cost of these attacks “Automation is driving down the cost of these attacks,” says Travis Volk, senior vice president of global service providers of Radware. “That means that the bad actors can cover smaller to medium businesses. We're having to, as a community, try to alleviate the burden into a much larger addressable market.” After traveling across four continents and visiting with over 75 unique ISPs, Travis Volk walked away with some interesting perspectives from industry leaders who are operating at the forefront of cybersecurity. “Hackers are also leveraging AI for widespread vulnerability assessment. Imagine they can sweep huge address ranges very quickly and use AI to accelerate code revision like bot variants and script modifications. And eventually, you get into this LMM prompt-assisted campaigns where we have some research being done in the universities that show 85% improvement in penetration testing with, basic prompting and retries through LLM support.” In this podcast, we discuss the top cyber threats they are facing Their challenges dealing with AI-empowered hackers who are exposing vulnerabilities a magnitude faster and moving down market to zero in on small businesses How they are coping with SOCs that are running exhausted Why layer 7 visibility, attack detection, and remediation are becoming more important Where they see blind spots in defense of distributed deployments What scaling modern protections have to do with the one aspiration they all share “I think we need to be mentally to evolve as well. Layered protections allow better contextual security and with a means for scaling. Modern consumer and enterprise applications require Layer 7 defense. Adding capabilities into existing platforms offers a sense of reliability and control. I would caution people to evaluate platforms capable of addressing numerous market segments and risk tolerances. I think one of the real challenges that the cyber community faces are providing quality security to more businesses.” Visit www.radware.com
The following article of the tech industry is: “RansomAware: An Executive Guide to Digital Extorsion” by Oscar Montes, Country Manager of Radware
Richard Campbell wrote his first line of code in 1977. His career has spanned the computing industry on both the hardware and software sides, development, and operations. He was a co-founder of Strangeloop Networks, acquired by Radware in 2013, and was on the board of directors of Telerik, which was acquired by Progress Software in 2014. Today, he is a consultant and advisor to a number of successful technology firms and is the founder and chairman of Humanitarian Toolbox (www.htbox.org), a public charity that builds open-source software for disaster relief. Richard also hosts three podcasts: .NET Rocks! (www.dotnetrocks.com) for .NET developers, RunAs Radio (www.runasradio.com) for IT Professionals, and Windows Weekly (https://twit.tv/shows/windows-weekly). Topics of Discussion: [2:24] Richard's podcasting career over 20 years and his advice for new podcasters. [6:30] The common topics that Richard talks about. [11:32] Adaptive cruise control and limitations of current AI. [13:34] Potential for autonomous trucks and freight trains. [16:12] Improving software user experience with machine learning. [17:32] How AI may change (and not change) 10 years from now. [19:32] How the voice interface has gotten better. [22:21] The impact of automation on software development jobs. [28:19] The appropriate uses of low-code platforms. [33:29] Habits vs. wisdom. [37:25] The future of augmented reality. [39:15] Importance of experimenting with different tools. [42:43] How augmented reality may disrupt smartphones. [43:49] Jamming out on your tools, much like a musician experimenting. Mentioned in this Episode: Clear Measure Way Architect Forum Software Engineer Forum Programming with Palermo — New Video Podcast! Email us at programming@palermo.net. Clear Measure, Inc. (Sponsor) .NET DevOps for Azure: A Developer's Guide to DevOps Architecture the Right Way, by Jeffrey Palermo — Available on Amazon! Jeffrey Palermo's Twitter — Follow to stay informed about future events! “Richard Campbell on the History of .NET - Episode 133” Want to Learn More? Visit AzureDevOps.Show for show notes and additional episodes.
The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attackers can slip through the cracks, exploiting new weaknesses or mimicking harmless traffic. Thus, businesses are exposed and face potential data breaches, financial ruin, and damaged reputations.That's where Advanced Threat Intelligence (ATI) comes in – a game-changer in the cybersecurity arsenal. Unlike our old shields, ATI offers real-time intel on the latest threats, how attackers operate, and their ever-evolving tactics. Recognising the limitations of traditional security solutions, Radware goes beyond basic shields. Imagine a high-powered watchtower constantly scanning the digital horizon, identifying threats before they strike. In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Arik Atar, Senior Threat Intelligence Researcher at Radware, to discuss: The Current Threat LandscapeModern Attacker TacticsRomance Scams & Pig ButcheringThe Radware Advantage
The following article of the tech industry is: “How Women Will Solve Your Cybersecurity Problem” by Oscar Montes, Country Manager of Radware
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other network-based attacks. We'll discuss everything from the current state of DDoS attacks to use in the military and even the impact of cyberattacks on popular culture! You can find the report Pascal mentions here, on Radware's website: https://www.radware.com/threat-analysis-report/ In this week's news segment, we discuss the lack of funding announcements, and the potential effect RSA could have on the timing of all sorts of press releases. We also discuss 1Password's potential future with its sizable customer base and the $620M it raised a few years back. Some other topics we discuss: NIST CSF 2.0 insider threats Ivanti Pulse Secure's appliance software found to be running positively ancient software (11 year old Linux distro, 5-20+ year old libraries & components) Nevada AG trying to get messaging decrypted for children, to "protect them" Kelly Shortridge's response to CISA's secure development RFI OpenAI's new GenAI video product, Sora and the potential impact it could have on cybersecurity Instacart spews out crappy AI recipes and photos Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-351
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other network-based attacks. We'll discuss everything from the current state of DDoS attacks to use in the military and even the impact of cyberattacks on popular culture! You can find the report Pascal mentions here, on Radware's website: https://www.radware.com/threat-analysis-report/ In this week's news segment, we discuss the lack of funding announcements, and the potential effect RSA could have on the timing of all sorts of press releases. We also discuss 1Password's potential future with its sizable customer base and the $620M it raised a few years back. Some other topics we discuss: NIST CSF 2.0 insider threats Ivanti Pulse Secure's appliance software found to be running positively ancient software (11 year old Linux distro, 5-20+ year old libraries & components) Nevada AG trying to get messaging decrypted for children, to "protect them" Kelly Shortridge's response to CISA's secure development RFI OpenAI's new GenAI video product, Sora and the potential impact it could have on cybersecurity Instacart spews out crappy AI recipes and photos Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-351
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other network-based attacks. We'll discuss everything from the current state of DDoS attacks to use in the military and even the impact of cyberattacks on popular culture! You can find the report Pascal mentions here, on Radware's website: https://www.radware.com/threat-analysis-report/ Show Notes: https://securityweekly.com/esw-351
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other network-based attacks. We'll discuss everything from the current state of DDoS attacks to use in the military and even the impact of cyberattacks on popular culture! You can find the report Pascal mentions here, on Radware's website: https://www.radware.com/threat-analysis-report/ Show Notes: https://securityweekly.com/esw-351
Radware anuncia el Latam Cybersecurity Summit 2024 en Colombia: Explorando la Vanguardia en la Protección Digital, además OhmyFi - Empresa colombiana que busca conectar a más de 50 millones de latinoamericanos a través de redes WiFi abiertas; ¿Quién es Sheryl Sandberg? y para los que están interesados en comprar OpenAI, ¿saben cuál es el nuevo precio de valorización de esa empresa?
In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies are beginning to recognise the shift from a reactive stance to a proactive one. This shift isn't just a technological upgrade - it's a fundamental change in mindset that can cause ripples throughout the business. In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Uri Dorot, Senior Product Marketing Manager at Radware as they discuss:AI-powered attacksResponsive protection vs proactive protectionHow proactivity works in practice
היה לי הכבוד לארח את ליאור יוגב - מייסד-שותף ומנכ"ל FundGuard (פאנדגארד). חברת פאנדגארד פיתחה פלטפורמת ענן לניהול תיקי השקעות, המיועדת לגופים מוסדיים בשוק שנותן שירות לנכסים פיננסיים בשווי טריליוני דולרים. הפלטפורמה של פאנדגארד נותנת מענה לניהול מוצרים פיננסיים שונים, לרבות קרנות נאמנות, ETF וקרנות גידור, תוך ביצוע של אוטומציה בניהול תיקים ואדמיניסטרציה בעזרת יכולות בינה מלאכותית. הטכנולוגיה מביאה לצמצום עלויות באמצעות שיפור תהליכי עבודה ויכולות שיתוף פעולה בין יחידות וחברות שונות. היא מאפשרת זיהוי בעיות וכשלים ומספקת תובנות מעשיות לשיפור הניהול. החברה גייסה 57 מיליון דולר מאז הקמתה מהקרנות Team8, Blumberg, Lion Bird וכמו-כן מהשותפים והלקוחות האסטרטגיים Citi ו-State Street. פאנדגארד מעסיקה מעל 100 עובדים, רובם במרכז הפיתוח הישראלי הממוקם במגדלי עזריאלי בתל אביב והשאר במשרדים בבוסטון, ניו-יורק ולונדון וממשיכה לצמוח ולגייס עובדים בכל תחומי פעילותה כולל תפקידי פיתוח, ניהול מוצר ועוד. פאנדגארד הוקמה בשנת 2018 על ידי ליאור יוגב, מנכ״ל החברה, יניב זכריה, CTO ואורי כץ, VP R&D, אשר הכירו במהלך שירותם הצבאי ביחידה 8200. לפני הקמת החברה שימש ליאור מנהל הפעילות בצפון אמריקה בחברת Multifonds, שנמכרה ל- Temenos בסכום של 265 מיליון דולר. בתחילת דרכו המקצועית הוא עסק בפיתוח תוכנה ב-Radware ובהמשך עבד כבנקאי השקעות בגולדמן זאקס. ליאור בעל תואר ראשון במדעי המחשב ותואר שני במנהל עסקים. (*) ללינקדאין שלי: https://www.linkedin.com/in/guykatsovich/ (*) לאינסטגרם שלי: https://www.instagram.com/guykatsovich/ (*) עקבו אחרינו ב"עוד פודקאסט לסטארטאפים" וקבלו פרק מדי שבוע: ספוטיפיי:https://open.spotify.com/show/0dTqS27ynvNmMnA5x4ObKQ אפל פודקאסט:https://podcasts.apple.com/podcast/id1252035397 גוגל פודקאסט:https://bit.ly/3rTldwq עוד פודקאסט - האתר שלנו:https://omny.fm/shows/odpodcast ה-RSS פיד שלנו:https://www.omnycontent.com/.../f059ccb3-e0c5.../podcast.rssSee omnystudio.com/listener for privacy information.
Martin Creighan tells us why you should “You don't have to be a jerk to be successful”, why “It's ok to be afraid”, and that “Real leadership is putting your team out front” and other insightful lessons it took him years to learn. About Martin Creighan Inspired by people, building new relationships and a continuous curiosity of learning, Vice President of Sales, Martin Creighan has joined our leadership team to propel Commvault's innovative brand and award-winning software and SaaS offerings into the Australian and New Zealand markets. Martin has over three decades of experience and brings a wealth of leadership expertise and knowledge in the software, cloud, technology, telecommunications and defence industries, having held numerous senior leadership and sales positions. Prior to joining Commvault, Creighan was the Vice President and General Manager of Cloud Software Group (Citrix, NetScaler and Tibco) Australia and New Zealand where he was responsible for go to market execution and revenue/profit growth. He previously held senior sales and general management leadership roles at AT&T, Radware, SecureNet/Baltimore Technologies and was an Operations Specialist and Master Training Specialist with the United States Navy. Creighan holds a Bachelor of Business from The National University of San Diego, California, and is a Certified Master Training Specialist from US Navy. Episode Notes Lesson 1: You don't have to be a jerk to be successful 04:18 Lesson 2: Look after your people and your people will always looks after you! 16:32 Lesson 3: Your “Why” doesn't have to be industry specific. 21:40 Lesson 4: Tackle each of life's challenges one step at a time. 28:24 Lesson 5: Always be kind. 31:25 Lesson 6: Real leadership is putting your team out front. 35:42 Lesson 7: Build your team based on Attitude, not aptitude! 38:55 Lesson 8: Don't be a “Gonna”. 42:15 Lesson 9: It's ok to be afraid! 46:24 Lesson 10: Never, ever forget where you came from. 49:45
Application security is a complex, wide-ranging field. With attackers using a wide range of attacks from credential stuffing to cookie poisoning, how can you keep up with the ever-evolving landscape?In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:Main challenges in protecting applicationsGrowing threat landscapeConsistent security across multi-cloud and hybrid environments
In this week's episode of The Conference Room, we welcome Matthew Andriani, CEO of Mazebolt Technologies, as we delve deep into the world of cybersecurity, particularly focusing on the evolution and mitigation of DDoS attacks. Matthew talks us through the inception, growth, and effectiveness of Radar, Mazebolt's pioneering DDoS defense solution, the flaws of traditional DDoS mitigation practices and how Radar aims to revolutionize the sector. Sit back and listen to a captivating discussion filled with real-world case studies, industry critiques, and a look into the future of DDoS defenses. KEY TAKEAWAYS FROM THIS WEEK'S EPISODE [00:02] Guest Introduction & Cybersecurity Background Matthew Andriani's background is explored, including his experience in various roles within cybersecurity, such as technical, professional services, and security research positions. [05:37] Evolution of DDoS Attacks Discussion on the historical context and evolution of DDoS attacks, their complexity, and why they pose a significant threat in today's digital landscape. [12:21] Introduction of Radar Matthew introduces Radar, a pioneering solution that modernizes DDoS defenses. He also delves into the system's unique features and capabilities. [18:45] Vendor Relationships Importance of vendor partnerships in enhancing Radar's efficiency is discussed, and Matthew sheds light on the criteria for selecting technology partners. [26:59] Industry Critique Matthew critiques the traditional DDoS mitigation practices, emphasizing their inadequacies and how Radar addresses these shortcomings. [33:08] Radar's Impact Exploration of Radar's effectiveness, featuring real-world case studies that highlight its practical utility and positive impact on DDoS defense strategies. [40:17] Product Development Journey Matthew walks us through the ideation, development, and evolution phases of Radar, focusing on the technical challenges and the solutions implemented. THIS WEEK'S GUEST - MATTHEW ANDRIANI Matthew Andriani is an esteemed expert and innovator in cybersecurity, serving as the founder and CEO of Mazebolt, a leading cybersecurity vendor. With an extensive career that spans roles in technical operations, professional services, and cutting-edge security research, he has accrued valuable expertise from his tenure at industry giants such as Check Point Software, Corrigon, and Radware. Holding two U.S. Patents for non-disruptive DDoS testing methods, Matthew is consistently at the vanguard of cybersecurity technological advancements. His leadership at Mazebolt enables him to continually push the envelope in cybersecurity solutions. To learn more about Matthew, please visit his LinkedIn profile, and to learn more about Mazebolt, please visit their Website and their YouTube channel. YOUR HOST - SIMON LADER Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and lead generation consultancy Flow and Scale. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people create consistent revenue through consistent lead generation. Get to know more about Simon at: Website: https://simonlader.com Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader/ The Conference Room is available on Spotify Apple Podcasts Amazon Music iHeartRadio And everywhere else you listen to podcasts!
The following article of the tech industry is: “Cybersecurity Lessons From the World of Elite Sports” by Oscar Montes, Country Manager of Radware
Radware sorprendió en Santa Cruz (Bolivia) con su famoso evento “Hackers Challenge”, permitiendo a los invitados experimentar en vivo una simulación de ataque a una empresa por alrededor de 20 hackers presentes, para entender las posibles estrategias de defensa contra tácticas maliciosas, en una experiencia única frente a una audiencia que siguió cada detalle en tiempo real.
The following article of the tech industry is: “Saving SecOps Ryan: Is Cyberwar Real or Something From a Movie?” by Oscar Montes, Country Manager of Radware
Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. To mitigate the risks of supply chain attacks, organisations should perform due diligence on their vendors, monitor their vendor's security practices, and implement strict access controls and network segmentation.In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:Supply chain attacks from the client sideTraditional WAF vs server protections vs client side protectionsDeployment experiences
“You see it in the news every day,” says Travis Volk, Vice President of Global Service Providers, Radware. In recent years, cyber-attacks have soared against the telecom industry. Outages, intrusions, and malicious attacks from independent and state-sanctioned actors have highlighted how vulnerable the telecom infrastructure can be. Because the telecom industry controls much of the nation's critical infrastructure, a successful attack can have a significant and extensive impact. With the scale, complexity, and frequency of attacks on the rise, carriers will need to raise their game in response. During this podcast, Volk discusses the current risks and potential future threats in the telecom industry and explain what carriers can do to safeguard their critical infrastructure. “The main misconception, that most operators have for themselves, is that conventional tools give them the visibility and control over these modern events.” We learn that this mismatch of traditional tools and today's attacks, leaves operators very vulnerable to attacks with real economic damage, both in terms of actual disruption, and with lost customers, brand damage and so on. Volk walks us through the scale of the issue and then makes the case for an updated, multifaceted approach to fighting and winning this daily battle. Visit www.radware.com
Bot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.And with half of all internet traffic coming from bots (both good ones and bad ones), managing that bot traffic is critical. Financial institutions, ticket-selling sites and shopping sites are among the hardest hit, with cybercriminals employing ML and AI in these bots to scale the size of their crimes and ambitions.In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:The world of application protectionWhy companies are underequipped to deal with bot attacksDedicated bot mitigation solutions
A short podcast updating listeners on the security news of the last few days, as prepared and presented by Catalin Cimpanu. You can find the newsletter version of this podcast here. Show guests include Yoav Gazelle, Chief Business Officer at Radware, and Daniel Schell, co-founder of AirLock Digital, this episode's sponsor. Show notes Risky Biz News: Google TAG says it tracks 30 surveillance vendors
Welcome to another episode of the Thought Leadership Podcast! In this episode, we had the fantastic opportunity to talk to a great salesman, Jamie Shanks. He gave us incredible insights, that you won't want to miss, on how and why you need to implement some strategies to make more sales.Introduction (00:00)Can you grow a business only on sales? (01:22)Who's better, a salesman or a subject matter expert? (02:53)How to generate sales in 90 days (06:42)Pitchslapping on LinkedIn (09:17)Defining relationship signals (14:05)Should you hide or share your rates (17:18)Upgrade your sales game (20:52)Establishing a good sales benchmark (25:05)Investing in your personal brand (28:02)Inbound vs. Outbound (33:03)What do you do question (39:34)Making the most out of this particular investment (40:30)Entrepreneur Tip (41:51)About Jamie Shanks: For the last 10 years, Jamie has dedicated himself to scaling his first community - Sales for Life. Over these past 10 years, he has evolved the Sales for Life community from Social Selling, to Modern/Digital Selling, to attacking the most pervasive problem in sales head-on: Sales-Generated Pipeline at Scale.Most of Sales for Life's customers have been global enterprise and global mid-market, including Microsoft, Thermo Fisher, Absolute Software, Radware, and many others.Pipeline Signal Website: https://pipelinesignals.com/Jamie's LinkedIn: https://ca.linkedin.com/in/jamestshanks
Being a brand new sales development representative is often stressful. It requires a lot of patience, rock-solid skills, and hard work. But above all, if you want to succeed as a newbie in sales, you've got to be open to learning. Just like an athlete, you have to be coachable.In this episode of the Tech Sales is for Hustlers podcast, our hosts Marc Gonyea and Chris Corcoran welcome Will Ossai, currently an Associate Sales Manager at Radware and a memoryBlue alumni. They get into what it means to be coachable in sales, why you will progress faster if you know your desired outcomes and stay laser-focused on your goals, and how to get the full benefit of your career in sales.
The cloud vs. on-prem. Is one more secure than the other? What security concerns arise when moving to the cloud?On this episode of Life in the Cloud, Eyal Arazi, Product Marketing Manager at Radware joins the show. Eyal points out that on-prem environments are typically self-contained. Cloud environments rely on shared API, shared identities, and shared roles.If there were an attack on a web server with on-prem, that's as far as the attack would go. In the cloud, the attackers could piggyback off the web server to access the database that sits behind it. "Think of it like skipping stones in a pond. You're not interested in that first hop, but you're interested in the subsequent hops."Eyal reminds us that on-prem security has been around for 40 years while cloud security is still in its infancy. It doesn't make it less secure than on-prem.Hear about the key issues to consider to securely move to a cloud environment and much more in this episode. Don't forget to subscribe to the show on iTunes, Spotify, or wherever you get your podcasts.See you in the next episode!
Founder and CEO of IRONSCALES Eyal Benishti answers our previous guests questions posed to him directly on various topics. As Chief Executive Officer at IRONSCALES, Eyal Benishti pioneered the development of the world's first self-learning anti-phishing email security solution that combines human intelligence and machine learning technologies for automatic prevention, detection and autonomous incident response to cyber-attacks in real time. Under Eyal's leadership, IRONSCALES has filed four patents for anti-phishing and email security solutions and secured three funding rounds from K1 and Israel's RDSeed totaling more than $20 million. IRONSCALES has received numerous awards, including Frost & Sullivan's AI-Powered Email Security Innovation Award and Best Enterprise Email Security Solution by the Cybersecurity Breakthrough Awards. Eyal brings to his executive leadership role nearly 15 years of software industry experience with enterprise and startup companies. Prior to founding IRONSCALES in 2013, he was a security researcher and malware analyst at Radware and worked as technical lead for various information security solutions at Imperva. Previously, he held a variety of R&D roles with Comverse and Amdocs. A passionate cybersecurity researcher from a young age, Eyal earned his bachelor's degree in computer science and mathematics from Bar-Ilan University in Israel. Connect with Eyal on Linkedin https://www.linkedin.com/in/eyalbd1/
This Week, In the Enterprise Security News: Okta acquires Auth0, KnowBe4 Acquires MediaPRO, PayPal to acquire Curv, and Dropbox to acquire DocSend Aqua Security raises $135M, Privacera Secures a Series B, YL Ventures sells its stake in Axonius, Snyk Secures a Series E, and McAfee sells its Enterprise business AWS Announces New Lower Cost Storage, Radware's New Integrated Application Delivery & Protection, Bitdefender launches new Cloud-based EDR Solution, Awake's NDR platform, CrowdStrike Falcon enhancements improve SOC efficiency, Tufin releases Vulnerability-Based Change Automation App, Gigamon launches Hawk, Sonatype Releases New Nexus Firewall Policy to Secure Software Supply Chains, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw219
This week, In the first segment, Chris Cleveland from PIXM join us to discuss using computer vision to combat phishing! Next up, Jeff Foley joins for an interview on the OWASP Amass Project! In the Enterprise Security News: Okta acquires Auth0, KnowBe4 Acquires MediaPRO, PayPal to acquire Curv, and Dropbox to acquire DocSend, Aqua Security raises $135M, Privacera Secures a Series B, YL Ventures sells its stake in Axonius, Snyk Secures a Series E, and McAfee sells its Enterprise business, AWS Announces New Lower Cost Storage, Radware's New Integrated Application Delivery & Protection, Bitdefender launches new Cloud-based EDR Solution, Awake's NDR platform, CrowdStrike Falcon enhancements improve SOC efficiency, Tufin releases Vulnerability-Based Change Automation App, Gigamon launches Hawk, Sonatype Releases New Nexus Firewall Policy to Secure Software Supply Chains, & more! Show Notes: https://securityweekly.com/esw219 Visit https://securityweekly.com/Pixm to learn more about them! Threat Report: https://pixm.net/wp-content/uploads/2021/03/Pixm-Q4-2020-Threat-Report.pdf https://github.com/OWASP/Amass https://owasp.org/www-project-amass/ Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, In the first segment, Chris Cleveland from PIXM join us to discuss using computer vision to combat phishing! Next up, Jeff Foley joins for an interview on the OWASP Amass Project! In the Enterprise Security News: Okta acquires Auth0, KnowBe4 Acquires MediaPRO, PayPal to acquire Curv, and Dropbox to acquire DocSend, Aqua Security raises $135M, Privacera Secures a Series B, YL Ventures sells its stake in Axonius, Snyk Secures a Series E, and McAfee sells its Enterprise business, AWS Announces New Lower Cost Storage, Radware's New Integrated Application Delivery & Protection, Bitdefender launches new Cloud-based EDR Solution, Awake's NDR platform, CrowdStrike Falcon enhancements improve SOC efficiency, Tufin releases Vulnerability-Based Change Automation App, Gigamon launches Hawk, Sonatype Releases New Nexus Firewall Policy to Secure Software Supply Chains, & more! Show Notes: https://securityweekly.com/esw219 Visit https://securityweekly.com/Pixm to learn more about them! Threat Report: https://pixm.net/wp-content/uploads/2021/03/Pixm-Q4-2020-Threat-Report.pdf https://github.com/OWASP/Amass https://owasp.org/www-project-amass/ Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This Week, In the Enterprise Security News: Okta acquires Auth0, KnowBe4 Acquires MediaPRO, PayPal to acquire Curv, and Dropbox to acquire DocSend Aqua Security raises $135M, Privacera Secures a Series B, YL Ventures sells its stake in Axonius, Snyk Secures a Series E, and McAfee sells its Enterprise business AWS Announces New Lower Cost Storage, Radware's New Integrated Application Delivery & Protection, Bitdefender launches new Cloud-based EDR Solution, Awake's NDR platform, CrowdStrike Falcon enhancements improve SOC efficiency, Tufin releases Vulnerability-Based Change Automation App, Gigamon launches Hawk, Sonatype Releases New Nexus Firewall Policy to Secure Software Supply Chains, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw219
Radware's CTO, David Aviv, and VP of strategy, Mike O'Malley, discuss security concerns that companies have as they get ready for 5G and endeavor to protect applications and services in their data centers, edge networks and cloud deployments.
Welcome! Craig discusses the Cybersecurity jobs of the future -- What is Hot and What is not. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Huawei's expired US license is bad news for phone owners Security Jobs With a Future -- And Ones on the Way Out NSA & FBI Disclose New Russian Cyberespionage Malware FCC beats cities in court, helping carriers avoid $2 billion in local 5G fees Business Email Compromise Attacks Involving MFA Bypass Increase NSA and FBI warn that new Linux malware threatens national security How Fast Is SpaceX's Satellite Internet? Beta Tests Show it Hitting Up to 60Mbps ISIS Allegedly Ran a Covid-19 PPE Scam Site --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Hey, if you're thinking about a career in cybersecurity, or maybe you are already someone in cybersecurity. We've got a great little article here from dark reading that gets right into it. What does a job look like? Hi everybody. Craig Peterson here. Now you've heard about the world's most dangerous jobs and they come down in the United States to two things. One is being a forestry person that cuts down trees and logs and all that sort of stuff. What would you call that a logging person? Even if it's someone who does it in the residential areas, very dangerous, very high rate of insurance, and insurance claims. And then the other one of course is. Up in the North seas here in the Pacific ocean, up in the past, the Bering Strait and all that mess up there, which is crab fishing. And how dangerous that is there. They're very dangerous. And people leave those jobs often because they got injured. People die from those jobs. It's very scary. they called dead branches on trees, widow makers, because they are going to fall down on you causes just nothing but problems, right? They'll kill you. That's what widow makers all about. If you are looking at cybersecurity careers, it's not going to kill you. At least. Hopefully, it's not going to kill you, but the number of people that experience burnout is huge. We're talking people on average, leaving these jobs after about eight months. Now, in some cases, they're getting the training that they want and increasing their value in the marketplace and then leaving for a better job, better pay, whatever it is elsewhere because they can. We're looking at giving or take 2 million open jobs here within the next year or two, I've seen numbers saying as high as 5 million open jobs cybersecurity. That is a very big thing. So if your kids are in college thinking about this, if you're like some of our listeners, a few of you guys, I know I've gone back to school for this. We're going to be covering some of these things over the next few weeks aspects of cybersecurity jobs, what you might be looking at if you're going to do that. And also right now, we're going to get right into some of the job titles. What's hot. And what's not because cybersecurity, isn't just one thing. It's like any other it profession, they get very narrow. There are people who are, who are really into two specific things. Now the job sets are not as they were two or three years ago. Now, this is according to, let's see, it's Michael Malley, VP of strategy at Radware, and I have to agree with him. He is saying that the types of skillsets employers are looking for is evolving rapidly. And we'll be talking more about some of the stuff next week, but the bottom line for next week is that university degrees in cybersecurity will not get you hired. That's the bottom line here. They want people who have hands-on experience with this because it gets so difficult. The whole red team blue team, where you have one team of people who are attacking the infrastructure and another group of people who are trying to defend the infrastructure, all important stuff, and very difficult to, by the way, the red team are the hardest people to find. People who are attacking, who have attack skills. So we're seeing a lot of changes over the last few years, and now we've got this whole WuHan virus and people afraid of the COVID-19. So now we've got these large scale remote workforces we're trying to deal with. We're seeing a need for people who understand that concept and have the ability to implement what is called zero-trust work environment. This means just because you have a login doesn't mean you should have access to this machine. It's like I've said forever. I have caught salespeople going into the accounting systems and the accounting shares and changing their compensation. Yeah, they do that. Not all of them, but the less scrupulous ones do. So we need to come to the understanding that it is a business really. We can't trust anything. Zero trust networks. Now go to the point where even inside the office itself, there is no trust dabbling between the different devices that are on the same switch. Now, many of us have done this in the past by using some basic technology kinda like VPNs, right? Where we set up a virtual network and that network has the ability to talk to specific things. All these specific machines are on that little virtual network called a VLAN that we can set up. So that's all well and good. Yeah. Now we're moving really to the next level where every device on a switch or anything within the organization speaks directly to and only to a firewall slash router. We don't want this one to go to a generic router, we want it to go to a firewall. We want to make sure that it computer isn't infected and is trying to cross infect. One of the first things that happen when the bad guys get control of a system inside a network is they try and spread laterally. So they have control of a workstation. They try and get on other workstations within the business, find out what information is there that they can steal, that they can ransom. That's what they're trying to do. So as the true zero-trust network says, okay, Marie's workstation is trying to scan other machines on the network and it is shut off. That's the sort of thing we do. We stop the intrusions, we stop the hacks and that's what you need as well. Everything and everyone inside the network should be considered to be an outsider. Now, this whole concept of zero-trust is gaining popularity for very good reasons. I talk on the show every week about another company that has been hacked. So that has been a fish that has had ransomware that has had people inside, the Chinese back doors, man, it seems to be a weekly occurrence for us. Yet when you hear some of these feds talking about it under oath, Is there any evidence of the Chinese getting into any systems here to the United it States? They're talking about Huawei, they're talking about, all of these different companies from China, and they say, No, there's no evidence. I have personally seen it. I ran the FBI's InfraGard webinars for a couple of years. I put them together. I hosted them. I got the interviews. I did the interviews, the Q and A. I have not only seen this stuff myself on business networks, but I have spoken to many people who've also seen it. So I don't get why. These people in the government are trying to deny that the Chinese are doing anything here. It's absolutely just mind-blowing to me. So we've got more and more organizations putting their workloads now into public and private clouds and they're less interested in the hardware expertise. They want people who understand techs complex, IP infrastructure, not right, realizing what's really going on. A bigger focus on business resiliency really is this third major trend and the know-how needed here really focuses on technologies that make a network more intelligent and enabled to learn how to protect itself. Thinking about automation, about integration, about one pane of glass, about artificial intelligence and machine learning. So we're going to get into those exact titles, those exact roles. So you know what they are. So that we can speak to where's the career path, where are things going? And I can give you a little hint, AI and machine learning. They're going to be big. Hey, you're listening to Craig Peterson right here, online your favorite podcast app and of course on WGAN, including Wednesday mornings with Matt Gagnon seven 30. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
יזהר שי נולד בקיבוץ עין השלושה וגדל בירושלים. שירת כלוחם במלחמת לבנון הראשונה והמשיך לקריירה בטכנולוגיה. בשנת 1998 ייסד את החברה Business Layers שמכר כאמור חמש שנים. ב-2005 מכר ל-Radware חברה נוספת כמנכ"ל. בין 2006 ל-2015 שימש כשותף בקרן ההון סיכון המצליחה Canaan. בשנים האחרונות הרצה באונ' תל-אביב, ייסד את קהילת היזמות "אצטדיון הסטארט-אפ" והנחה את תוכנית הרדיו "היי-טק בפקקים". יזהר שי וחברי מפלגתו, כחולבן, לקחו החלטה מאוד קשה לפני שבוע ופירקו את המפלגה שרצה נגד בנימין נתניהו בשלוש מערכות הבחירות האחרונות, בגלל רצונם למנוע מערכת בחירות נוספת. הוא הגיע לספר על השיקולים שהנחו אותם ועל מה ניסו לעשות אופטימיזציה. על מה דיברנו: בנימין נתניהו, כחולבן, בחירות, שיקולים, קורונה, ליצמן, ליברמן, יובל דיסקין, אלונה ברקת, הפועל תל-אביב, הפועל באר שבע קישורים רלוונטיים: צרו קשר עם ראם הטקסט של יזהר מלפני עשור על הפועל תל-אביב מקום בעולם עלובי החיים, הסרט עליו ראם דיבר עברי לידר - זכיתי לאהוב
יזהר שי נולד בקיבוץ עין השלושה וגדל בירושלים. שירת כלוחם במלחמת לבנון הראשונה והמשיך לקריירה בטכנולוגיה. בשנת 1998 ייסד את החברה Business Layers שמכר כאמור חמש שנים. ב-2005 מכר ל-Radware חברה נוספת כמנכ"ל. בין 2006 ל-2015 שימש כשותף בקרן ההון סיכון המצליחה Canaan. בשנים האחרונות הרצה באונ' תל-אביב, ייסד את קהילת היזמות "אצטדיון הסטארט-אפ" והנחה את תוכנית הרדיו "היי-טק בפקקים". יזהר שי וחברי מפלגתו, כחולבן, לקחו החלטה מאוד קשה לפני שבוע ופירקו את המפלגה שרצה נגד בנימין נתניהו בשלוש מערכות הבחירות האחרונות. הוא הגיע לספר על השיקולים שהנחו אותם ועל מה ניסו לעשות אופטימיזציה. על מה דיברנו: בנימין נתניהו, כחולבן, בחירות, שיקולים, קורונה, ליצמן, ליברמן, יובל דיסקין, אלונה ברקת, הפועל תל-אביב, הפועל באר שבע קישורים רלוונטיים: צרו קשר עם ראם הטקסט של יזהר מלפני עשור על הפועל תל-אביב מקום בעולם עלובי החיים, הסרט עליו ראם דיבר עברי לידר - זכיתי לאהוב
The Project EGG Show: Entrepreneurs Gathering for Growth | Conversations That Change The World
Dror brings to Norwest more than 20 years of operational, technology and entrepreneurial experience, having worked extensively in both the U.S. and in Israel in various senior positions at leading global organizations. Dror most recently invested in and serves on the boards of CyberX, Cynet, Gong, Personali, SundaySky, VAST Data, Weka.IO, and Wiliot. Dror has served as a board member of Veraz Networks since 2004. Dror was a previous board participant at Fireglass (acquired by Symantec), Pontis (acquired by Amdocs), ScaleIO (acquired by EMC), Seculert (acquired by Radware), SolarEdge (Nasdaq: SEDG) Unisfair (acquired by InterCall), and Velostrata (acquired by Google) and was a board observer for ConteXtream (acquired by HP). At Norwest, Dror focuses on multi-stage (seed to pre-IPO) and multi-domain (enterprise, cloud, consumer, semi) investments in Israel. Prior to joining Norwest, Dror served as executive vice president and Chief Strategy Officer of ECI, which he joined in 2004. In this role, he was responsible for ECI's strategy, mergers and acquisitions, business development, and strategic marketing. Before joining ECI, Dror was CEO of Axonlink, an optical components start-up company. Prior to Axonlink, he was President of I-Link, a US-based VoIP service provider which acquired MiBridge, the VoIP software company he founded. Dror was also a senior research engineer at AT&T Bell Labs where he developed voice and video compression technologies, including the speech coder that is now the standard for CDMA cellular in North America. Dror holds a BSc in electrical engineering from the Technion – Israel Institute of Technology, Haifa. About The Project EGG Show: The Project EGG Show is a video talk show that introduces you to entrepreneurs from around the world. It is broadcast from studios in Metairie, Louisiana to online platforms including YouTube, iTunes, Google Play, Spotify and Stitcher, and hosted by Ben Gothard. Our goal is to give you a fresh, unscripted and unedited look into the lives of real entrepreneurs from around the globe. From billionaires to New York Times best selling authors to Emmy Award winners to Forbes 30 Under 30 recipients to TEDx speakers – we present their real stories – uncensored and uncut. Subscribe To The Show: https://projectegg.co/podcast/ Get Access To: 1. Resources: https://projectegg.co/resources/ 2. Financing Solutions: https://projectegg.co/epoch/ 3. Payment Solutions: https://projectegg.co/sempr/ 4. Services: https://projectegg.co/resources#services 5. Courses: https://projectegg.co/resources#courses 6. Software: https://projectegg.co/resources#software 7. Book: https://projectegg.co/resources#books --- Support this podcast: https://anchor.fm/projectegg/support
Today’s guest is Richard Campbell! Richard’s career has spanned the computing industry — both on the hardware and the software side; development and operations. He was a co-founder of Strangeloop Networks, which was acquired by Radware in 2013 and spent five years on the Board of Directors of Telerik (which was acquired by Progress Software in 2014). He has also founded Humanitarian Toolbox, an organization design to let developers around the world donate their skills to disaster relief organizations by building open source software. Today he is a consultant and advisor for a number of successful technology firms as well as the co-owner and content planner of the DevIntersection group of conferences. On top of all that, you may also recognize Richard as a co-host on two podcasts: .NET Rocks! and RunAs Radio! In this week’s fun episode, Jeffrey and Richard discuss software perspectives and shipping software without all the trendy buzzwords. Richard shares what he has learned over his time shipping software, his thoughts on Dev and Ops and how they can better come together, his recommendations on how to structure logs and what to log, the challenges with an independently running application or service, his predictions on what user interface types and application types will be the next big trend, and his best pick as far as all of the UI and application types available today. He also gives a bit of a sneak preview of the book he is currently working on about .NET! Topics of Discussion: [:40] Be sure to visit AzureDevOps.Show for past episodes and show notes! [:48] Where to get a hold of Jeffrey’s new book, .NET DevOps for Azure. [1:35] About today’s episode and guest. [2:50] Jeffrey welcomes Richard to the show! [4:09] Back when Richard wrote his first line of code in 1977, was there a division between Dev and Ops? [5:41] Jeffrey and Richard discuss shipping software, what Richard has learned over his time doing it, about the history of .NET book Richard is working on, and other key lessons from his various positions in the industry. [11:28] Richard gives his recommendations on how to structure logs and what to log. [14:51] The best thing you can do when you’re trying to work across teams. [16:02] There are a lot of developers… but where are the architects? And how does a developer become an architect? [19:40] A word from Azure DevOps sponsor: Clear Measure. [20:05] On the topic of ‘buzzwords…’ How would Richard classify a microservice? [22:41] One of the challenges with an independently running application or service: the state/data. [27:16] Richard gives his predictions on what user interface types and application types are going to be the next trend and his thoughts on what developers should be investing their skills in. [28:21] What would be Richard’s best pick as far as all of the UI and application types available today? [31:50] Is the language less important than the platform? [33:49] What're the best mechanisms for somebody getting into the platform today? [36:52] When is Richard’s .NET book coming out? And what will it be about? Mentioned in this Episode: Azure DevOps Clear Measure (Sponsor) — Reach out to Jeffrey @JeffreyPalermo on Twitter if you have a user group or conference and would like some free copies of .NET DevOps for Azure! .NET DevOps for Azure, by Jeffrey Palermo bit.ly/dotnetdevopsproject Humanitarian Toolbox .NET Rocks! Podcast RunAs Radio Podcast DevIntersection Progress Software’s acquisition of Telerik Microsoft Secrets: How the World's Most Powerful Software Company Creates Technology, Shapes Markets and Manages People, by Michael A. Cusumano Want to Learn More? Visit AzureDevOps.Show for show notes and additional episodes.
A report from Radware and Merrill Lynch details that the cost of a breach in 2019 is over $4.5 million. This episode talks about the report and the areas where the costs are felt the hardest. Source Report. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe to the Security In Five Newsletter. —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,
יזהר שי נולד בקיבוץ עין השלושה וגדל בירושלים. שירת כלוחם במלחמת לבנון הראשונה והמשיך לקריירה בטכנולוגיה. בשנת 1998 ייסד את חברת Business Layers שמכר כעבור חמש שנים. ב-2005 מכר ל-Radware חברה נוספת כמנכ"ל. בין 2006 ל-2016 שימש כשותף בקרן ההון סיכון המצליחה Canaan. בשנים האחרונות הוא מרצה באונ' תל-אביב ומייסד קהילת היזמות "אצטדיון הסטארט-אפ" ומנחה את תוכנית הרדיו "היי-טק בפקקים". כיומיים לאחר הקלטת הפרק הזה יזהר הצטרף לכנסת ישראל במסגרת מפלגת כחול לבן שגרפה 35 מנדטים בבחירות של 2019. על מה דיברנו: יזמות ישראלית, קפיטליזם, התערבות ממשלתית, ההסתדרות, בני גנץ, ניסנקורן, סמוטריץ', פריפריה, שיוויון הזדמנויות, כנסת ישראל, הצעות חוקים, מימון, יזמות, אריק שמידט, אהרון אהרון קישורים רלוונטיים: הספר עליו ראם המליץ הדף של יזהר שי בויקיפדיה היי טק בפקקים
יזהר שי נולד בקיבוץ עין השלושה וגדל בירושלים. שירת כלוחם במלחמת לבנון הראשונה והמשיך לקריירה בטכנולוגיה. בשנת 1998 ייסד את החברה Business Layers שמכר כאמור חמש שנים. ב-2005 מכר ל-Radware חברה נוספת כמנכ"ל. בין 2006 ל-2015 שימש כשותף בקרן ההון סיכון המצליחה Canaan. בשנים האחרונות הוא מרצה באונ' תל-אביב ומייסד קהילת היזמות "אצטדיון הסטארט-אפ" ומנחה את תוכנית הרדיו "היי-טק בפקקים". כיומיים לאחר הקלטת הפרק הזה יזהר הצטרף לכנסת ישראל במסגרת מפלגת כחול לבן שגרפה 35 מנדטים בבחירות של 2019. על מה דיברנו: יזמות ישראלית, קפיטליזם, התערבות ממשלתית, ההסתדרות, בני גנץ, ניסנקורן, סמוטריץ', פריפריה, שיוויון הזדמנויות, כנסת ישראל, הצעות חוקים, מימון, יזמות, אריק שמידט, אהרון אהרון קישורים רלוונטיים: הספר עליו ראם המליץ הדף של יזהר שי בויקיפדיה היי טק בפקקים
In today’s podcast, we hear about GossipGirl, potentially a “supra threat actor” Chronicle sees linking Stuxnet, Flame, and Duqu. LockerGoga’s destructive functionality may be a feature, not a bug. Venezuela now says its power grid is being hacked by Chile and Colombia. The US designates Iran’s Revolutionary Guard a terrorist organization. What’s up with New Zealand and hidden, networked cameras? And second thoughts about what counts as a “preliminary forensic investigation.” Joe Carrigan from JHU ISI on minding permissions on mobile devices. Guest is Mike O’Malley from Radware on the true costs of cyber attacks. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_09.html Support our show
This week, we interview Gururaj Pandurangi, Founder and CEO at Cloudneeti, to discuss Continuous Cloud Assurance! Gururaj Pandurangi is a founder and CEO of Cloudneeti, a software-as-a-service company focused on continuous cloud security, data privacy and compliance assurance. Gururaj has 20 years of professional experience, a good portion of it as an early adopter of cloud technologies and building global scale cloud products like Windows Live, Bing platform, Consumer Identity and Federations. Paul Asadoorian and Matt Alderman recorded interviews with the following vendors at RSA Conference 2019: - Venafi - XM Cyber - Onapsis Paul Asadoorian and Matt Alderman recap RSA Conference 2019, including their briefings with: - 42Crunch - Baffle - CyberInt - Eclypsium - Ericom Software - Lacework - Radware - RiskRecon and More! To learn more about Cloudneeti, visit: https://securityweekly.com/cloudneeti Full Show Notes: https://wiki.securityweekly.com/ES_Episode129 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Paul Asadoorian and Matt Alderman recap RSA Conference 2019, including their briefings with: - 42Crunch - Baffle - CyberInt - Eclypsium - Ericom Software - Lacework - Radware - RiskRecon and More! Full Show Notes: https://wiki.securityweekly.com/ES_Episode129 Visit http://securityweekly.com/esw for all the latest episodes!
Paul Asadoorian and Matt Alderman recap RSA Conference 2019, including their briefings with: - 42Crunch - Baffle - CyberInt - Eclypsium - Ericom Software - Lacework - Radware - RiskRecon and More! Full Show Notes: https://wiki.securityweekly.com/ES_Episode129 Visit http://securityweekly.com/esw for all the latest episodes!
This week, we interview Gururaj Pandurangi, Founder and CEO at Cloudneeti, to discuss Continuous Cloud Assurance! Gururaj Pandurangi is a founder and CEO of Cloudneeti, a software-as-a-service company focused on continuous cloud security, data privacy and compliance assurance. Gururaj has 20 years of professional experience, a good portion of it as an early adopter of cloud technologies and building global scale cloud products like Windows Live, Bing platform, Consumer Identity and Federations. Paul Asadoorian and Matt Alderman recorded interviews with the following vendors at RSA Conference 2019: - Venafi - XM Cyber - Onapsis Paul Asadoorian and Matt Alderman recap RSA Conference 2019, including their briefings with: - 42Crunch - Baffle - CyberInt - Eclypsium - Ericom Software - Lacework - Radware - RiskRecon and More! To learn more about Cloudneeti, visit: https://securityweekly.com/cloudneeti Full Show Notes: https://wiki.securityweekly.com/ES_Episode129 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud security portfolio! Full Show Notes: https://wiki.securityweekly.com/ES_Episode121 Visit http://securityweekly.com/esw for all the latest episodes!
Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud security portfolio! Full Show Notes: https://wiki.securityweekly.com/ES_Episode121 Visit http://securityweekly.com/esw for all the latest episodes!
This week, we welcome Tony Cole, Chief Technology Officer at Attivo Networks for an interview! Tony joins us to discuss the cyber deception in the enterprises today, and gives a brief history of deception and its applicability to cybersecurity! In the Enterprise News, Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud security portfolio! Full Show Notes: https://wiki.securityweekly.com/ES_Episode121 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Tony Cole, Chief Technology Officer at Attivo Networks for an interview! Tony joins us to discuss the cyber deception in the enterprises today, and gives a brief history of deception and its applicability to cybersecurity! In the Enterprise News, Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud security portfolio! Full Show Notes: https://wiki.securityweekly.com/ES_Episode121 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Dissecting Malicious Office Documents in Linux https://isc.sans.edu/forums/diary/Dissecting+Malicious+Office+Documents+with+Linux/24248/ Analyzing Compressed RTF Documents https://isc.sans.edu/forums/diary/Detecting+Compressed+RTF/24250/ SystemD DHCPv6 Remote Code Executing Vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-15688 Cryptominers Scan for Docker Engine https://blog.trendmicro.com/trendlabs-security-intelligence/misconfigured-container-abused-to-deliver-cryptocurrency-mining-malware DemonBot Targeting Hadoop https://blog.radware.com/security/2018/10/new-demonbot-discovered/
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Dissecting Malicious Office Documents in Linux https://isc.sans.edu/forums/diary/Dissecting+Malicious+Office+Documents+with+Linux/24248/ Analyzing Compressed RTF Documents https://isc.sans.edu/forums/diary/Detecting+Compressed+RTF/24250/ SystemD DHCPv6 Remote Code Executing Vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-15688 Cryptominers Scan for Docker Engine https://blog.trendmicro.com/trendlabs-security-intelligence/misconfigured-container-abused-to-deliver-cryptocurrency-mining-malware DemonBot Targeting Hadoop https://blog.radware.com/security/2018/10/new-demonbot-discovered/
This week, Paul is joined by Doug White to interview Ferruh Mavituna, Founder and Product Manager of Netsparker! In the news, we have updates from Atos, Trustwave, Radware, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode81 Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, Paul is joined by Doug White to interview Ferruh Mavituna, Founder and Product Manager of Netsparker! In the news, we have updates from Atos, Trustwave, Radware, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode81 Visit https://www.securityweekly.com/esw for all the latest episodes!
On this show, we talk to the famous podcaster, Richard Campbell (LinkedIn | Twitter). Richard is the co-host of the .NET Rocks podcast, host of the RunAs Radio podcasts, and a long-time technology consultant and business owner. We talk to him about Devops, the Microsoft data platform, the cloud and podcasting. Among other topics, we cover: What is DevOps, and how the database fits in this kind of strategy The state of the Microsoft data platform and the new versions of SQL Server How Microsoft Azure competes with Amazon and Google Cloud Will you lose your job to the cloud? What was the original purpose of the relational model The history of the .NET Rocks podcast and how its done today Items mentioned in the show: .NET Rocks Podcast RunAs Radio Podcast Goldman Sachs on Microsoft: 'We Were Wrong' Serial Podcast .NET Rocks Show 1220 - Next Generation Airliners Geek Out About Richard: Richard Campbell wrote his first line of code in 1977. His career has spanned the computing industry both on the hardware and software sides, development and operations. He was a co-founder of Strangeloop Networks, acquired by Radware in 2013 and spent five years on the board of directors of Telerik which was acquired by Progress Software in 2014. Today he is a consultant and advisor to a number of successful technology firms as well as the founder and chairman of Humanitarian Toolbox (www.htbox.org), a public charity that builds open source software for disaster relief. Richard is the co-owner and content planner of the DevIntersection (www.devintersection.com) group of conferences. He is also the host of two podcasts: .NET Rocks! (www.dotnetrocks.com) which publishes three shows a week to .NET developers and RunAs Radio (www.runasradio.com) which is a weekly show for IT Professionals. You can reach Richard at richard@pwop.com.
This podcast series explores topics of interest to OpenStack practitioners, focusing on the ecosystem in Israel. In this episode I welcome back Samuel Bercovici of Radware, and we talk about how to contribute to OpenStack. Shlomo Swidler’s OpenStackIL Podcast Episode 6: Welcoming Back Samuel Bercovici of Radware Subscribe to this podcast series The post OpenStack Israel Podcast, Episode 6 appeared first on Shlomo Swidler.
SecuraBit Episode 82: Totally Rad Man! May 18, 2011 Hosts: Anthony Gartner – @anthonygartner http://anthonygartner.com Chris Gerling – @chrisgerling Christopher Mills – @thechrisam Jason Mueller – @securabit_jay Andrew Borel – @andrew_secbit Tony Huffman – @myne_us Guests: Carl Herberger from http://www.radware.com/ General topics: DDOS: Recent attacks from groups like anonymous , attack vectors, technique information and how it can effect you. Signatures: Signature based detection and the effects it had on todays security General security: Some general discussion on security Securibit exploit development group (SEG) starting up blog post coming soon. NEWS: PSN hacked again! : Just two days after the PlayStation Network was restored after a near month-long outage, the PSN password page has apparently been exploited. According to reports, the exploit allows other users to reset your account password using only your e-mail address and date of birth. This personal data was made available to hackersduring the initial PSN attack. http://arstechnica.com/gaming/news/2011/05/report-playstation-network-passwords-exploited-accounts-compromised.ars international_strategy_for_cyberspace.pdf http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf Backtrack 5 is out http://www.backtrack-linux.org/ Facebook privacy demo gets guy arrested in austrelia http://www.net-security.org/secworld.php?id=11045 Microsoft patch tuesday http://www.microsoft.com/technet/security/bulletin/ms11-may.mspx Use our discount code "Connect_SecuraBit" to get $150.00 off of ANY training course. The discount code is good for all SANS courses in all formats. Upcoming events #BSidesDetroit (3 - 4 Jun 2011) #BSidesStJohns St. John's, NL (10 Jun 2011) #BSidesCT Meriden, CT (11 Jun 2011) FIRST Austria (12 - 17 June 2011) #BSidesVienna(18 June 2011) Toorcon (18 - 19 June 2011) #BSidesLasVegas (3-4 August 2011) BlackHat Vegas (3 - 4 August 2011) DEFCON 19 (4 - 7 August 2011) #BSidesLA Los Angeles, CA (18 - 19 August 2011) #BSidesMO(21 Oct 2011) #BSidesNewDelhi (22 - 23 October 2011) VB Barcelona October 2011 Links: http://www.securabit.com Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405 iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
This is a real story of modern extortion in a cyberworld. Bots have replaced dynamite and you don't buy "protection" to prevent your shop from going in flames; you buy "consulting" to prevent your IT from beeing DoSed. From the first limited synflood to the conclusion, we will review those crazy 48 hours that end up in a one to one digital fight. We will see in depth which attacks and mitigation techniques where involved and how they both evolved quickly in complexity and intensity. As a conclusion we will see which were the major weaknesses, found either in the network architecture, the security perimeter and the target application, and how it would have been possible to prevent such attack, limit its impact... and save money. Renaud Bidou has been working in the field of IT security for about 10 years. He first performed consulting missions for telcos, pen-tests and post-mortem audits, and designed several security architectures. In 2000 he built the first operational Security Operation Center in France which quickly became the 4th French CERT and member of the FIRST. He then joined Radware as the security expert for Europe, handling high criticity security cases. In the mean time Renaud is an active member of the rstack team and the French Honeynet Project with studies on honeynet containment, honeypot farms and network traffic analysis. He regularly publishes research articles in the French security magazine MISC and teaches in several universities in France.
Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Technologies emerge on a regular basis with new promises of better security. This is more or less true. However we know there are still weaknesses and that 100% security is not realistic. Therefore the real need when deploying a new security device is to know its limits. IPS are part of those new technologies. They are oversold by marketing speeches and promises of an absolute security. Guess what? This is not exactly the truth.... The purpose of this speech is not to discredit IPS but to help in understanding the limits of technologies that are involved. We will particularly focus on the following subjects: * conceptual weaknesses and ways to detect "transparent" inline equipments * signatures issues * hardware architecture limitations and common jokes * performance vs security necessary trade-off and consequences * behavioral, heuristics, neuronal stuff etc. reality and limitations Through examples, proofs of concept and test beds results we should provide a broad view of IPS reality, what you can expect from them now and what they will never do for you. Renaud Bidou has been working in the field of IT security for about 10 years. He first performed consulting missions for telcos, pen-tests and post-mortem audits, and designed several security architectures. In 2000 he built the first operational Security Operation Center in France which quickly became the 4th French CERT and member of the FIRST. He then joined Radware as the security expert for Europe, handling high severity security cases. In the mean time Renaud is an active member of the rstack team and the French Honeynet Project which studies on honeynet containment, honeypot farms and network traffic analysis. He regularly publishes research articles in the French security magazine MISC and teaches in several universities in France."
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
This is a real story of modern extortion in a cyberworld. Bots have replaced dynamite and you don't buy "protection" to prevent your shop from going in flames; you buy "consulting" to prevent your IT from beeing DoSed. From the first limited synflood to the conclusion, we will review those crazy 48 hours that end up in a one to one digital fight. We will see in depth which attacks and mitigation techniques where involved and how they both evolved quickly in complexity and intensity. As a conclusion we will see which were the major weaknesses, found either in the network architecture, the security perimeter and the target application, and how it would have been possible to prevent such attack, limit its impact... and save money. Renaud Bidou has been working in the field of IT security for about 10 years. He first performed consulting missions for telcos, pen-tests and post-mortem audits, and designed several security architectures. In 2000 he built the first operational Security Operation Center in France which quickly became the 4th French CERT and member of the FIRST. He then joined Radware as the security expert for Europe, handling high criticity security cases. In the mean time Renaud is an active member of the rstack team and the French Honeynet Project with studies on honeynet containment, honeypot farms and network traffic analysis. He regularly publishes research articles in the French security magazine MISC and teaches in several universities in France.
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
"Technologies emerge on a regular basis with new promises of better security. This is more or less true. However we know there are still weaknesses and that 100% security is not realistic. Therefore the real need when deploying a new security device is to know its limits. IPS are part of those new technologies. They are oversold by marketing speeches and promises of an absolute security. Guess what? This is not exactly the truth.... The purpose of this speech is not to discredit IPS but to help in understanding the limits of technologies that are involved. We will particularly focus on the following subjects: * conceptual weaknesses and ways to detect "transparent" inline equipments * signatures issues * hardware architecture limitations and common jokes * performance vs security necessary trade-off and consequences * behavioral, heuristics, neuronal stuff etc. reality and limitations Through examples, proofs of concept and test beds results we should provide a broad view of IPS reality, what you can expect from them now and what they will never do for you. Renaud Bidou has been working in the field of IT security for about 10 years. He first performed consulting missions for telcos, pen-tests and post-mortem audits, and designed several security architectures. In 2000 he built the first operational Security Operation Center in France which quickly became the 4th French CERT and member of the FIRST. He then joined Radware as the security expert for Europe, handling high severity security cases. In the mean time Renaud is an active member of the rstack team and the French Honeynet Project which studies on honeynet containment, honeypot farms and network traffic analysis. He regularly publishes research articles in the French security magazine MISC and teaches in several universities in France."