POPULARITY
Don Smith leads the CTU Threat Research group at Secureworks. His career starting with the creation of dns in 2005, and which was acquired by SecureWorks in 2009. He has extensive knowledge in cybersecurity and is seen as a world-leader in the field. Don is also the industry co-chair of the Strategic Cyber Industry Group in the National Cybercrime Unit at the UK National Crime Agency and a member of the UK National Cyber Advisory Board. He is also the co-chair of the Cyber League at the NCSC.
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc In the leadership and communications segment, The CISO Transformation — A Path to Business Leadership, The CISO's dilemma of protecting the enterprise while driving innovation, When Hiring, Emphasize Skills over Degrees, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-385
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc Show Notes: https://securityweekly.com/bsw-385
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc In the leadership and communications segment, The CISO Transformation — A Path to Business Leadership, The CISO's dilemma of protecting the enterprise while driving innovation, When Hiring, Emphasize Skills over Degrees, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-385
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc Show Notes: https://securityweekly.com/bsw-385
Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity verification. They have microphones, cameras, depth sensors, and fingerprint readers in some cases. With face scanning quickly becoming the de facto technology used for identity verification, it was a no-brainer for Nametag to build a solution around mobile devices to address employment scams. Segment Resources: Company website Aaron's book, Loyal Listeners of the show are probably aware (possibly painfully aware) that I spend a lot of time analyzing breaches to understand how failures occurred. Every breach story contains lessons organizations can learn from to avoid suffering the same fate. A few details make today's breach story particularly interesting: It was a Chinese APT Maybe the B or C team? They seemed to be having a hard time Their target was a blind spot for both the defender AND the attacker Segment Resources: https://www.binarydefense.com/resources/blog/shining-a-light-in-the-dark-how-binary-defense-uncovered-an-apt-lurking-in-shadows-of-it/ https://www.theregister.com/2024/09/18/chinesespiesfoundonushqfirm_network/ This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-393
Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity verification. They have microphones, cameras, depth sensors, and fingerprint readers in some cases. With face scanning quickly becoming the de facto technology used for identity verification, it was a no-brainer for Nametag to build a solution around mobile devices to address employment scams. Segment Resources: Company website Aaron's book, Loyal Listeners of the show are probably aware (possibly painfully aware) that I spend a lot of time analyzing breaches to understand how failures occurred. Every breach story contains lessons organizations can learn from to avoid suffering the same fate. A few details make today's breach story particularly interesting: It was a Chinese APT Maybe the B or C team? They seemed to be having a hard time Their target was a blind spot for both the defender AND the attacker Segment Resources: https://www.binarydefense.com/resources/blog/shining-a-light-in-the-dark-how-binary-defense-uncovered-an-apt-lurking-in-shadows-of-it/ https://www.theregister.com/2024/09/18/chinesespiesfoundonushqfirm_network/ This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-393
This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-393
This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-393
Ransomware payments saw a 35% decline in 2024—what's driving the drop? Sophos finalizes its $859 million acquisition of SecureWorks, signaling more M&A activity in cybersecurity for 2025. Plus, DeepSeek AI is gaining traction in healthcare, but its data policies raise serious concerns.Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Kyle Falkenhagen is the Chief Product Officer at Secureworks. In this episode, he joins host Charlie Osborne to discuss the concept of taking an open approach to cybersecurity and what it means for organizations, including the main advantages of an open platform, building out a security operations strategy, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Stacy Leidwinger is the VP of Marketing at Secureworks. In this episode, she joins host Charlie Osborne to discuss the risks and ramifications of cyberattacks, including the role security leaders play, as well as how best to mitigate these risks, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Curt Yasm is the senior product manager at Secureworks. In this episode, he joins host Charlie Osborne to discuss identity threats, including how the landscape has evolved, the impact on organizations, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Send us a textBrad's journey from sci-fi enthusiast to cybersecurity expert is an unconventional path filled with unexpected twists and valuable insights. Hear firsthand how his initial pursuit of engineering took a dramatic turn following 9/11, leading him to the military and into the Signal Corps, where his foundation in cybersecurity was forged. Discover how his experiences at SecureWorks highlight his dedication to diversifying the cybersecurity workforce by recruiting and training talent from varied backgrounds, making this field accessible to all with a passion for tech and a willingness to learn.Step into the high-stakes environment of cybersecurity as Brad shares gripping tales from mission deployments where every second counts. Feel the adrenaline of operating in high-pressure situations and the critical role certifications play in carving out a successful career in this field. Brad sheds light on the diverse backgrounds of cybersecurity professionals, illustrating how police officers and others transitioned into this field, proving that aptitude and determination often outweigh traditional education in achieving success.In the face of rapid AI integration, organizations encounter new hurdles with shadow IT and unsanctioned applications. Explore the intricate landscape of AI security threats and the pressing need for secure implementation, as Brad outlines the challenges posed by AI's rise. With over 92% of organizations facing data breaches from unauthorized apps, the urgency for robust security measures is palpable. Concluding with ways to connect with Brad and Morphysack, this episode promises a treasure trove of insights and a peek into future conversations on emerging AI threats.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to slow down for the scan - you can just keep on walking. We don't often cover physical security, so this interview is going to be a treat for us. There are SO many questions to ask here, particularly for our hosts who have done physical penetration tests, social engineering, and tailgating in the past to get past physical security measures. This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts' sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enterprise Security Weekly. Segment description coming soon! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-382
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to slow down for the scan - you can just keep on walking. We don't often cover physical security, so this interview is going to be a treat for us. There are SO many questions to ask here, particularly for our hosts who have done physical penetration tests, social engineering, and tailgating in the past to get past physical security measures. This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts' sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enterprise Security Weekly. Segment description coming soon! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-382
This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts' sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-382
This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts' sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-382
In this episode of "Screaming in the Cloud," we're making sure things are nice and secure thanks to Ryan Nolette, Senior Security Engineer at AWS Outreach. As a part of the Outreach team, he's responsible for making everyone understand the nuances of AWS's Vulnerability Disclosure Program. Corey and Ryan explore the intricacies of AWS's approach to security, including the emphasis on communication with researchers. You'll also get an overview of what goes into Vulnerability Disclosure Programs and how it courts security researchers over “security researchers.” If there's anything you can take away from this episode, it's that Ryan takes great pride in AWS's commitment to transparency and collaboration when it comes to resolving potential security flaws.Show Highlights(0:00) Intro(0:38) Blackblaze sponsor read(1:06) The role of AWS' security team outreach group(2:21) The nuance of the Vulnerability Disclosure Program(4:05) Will the VDP program replace human interactions(10:08) Response disclosure vs. coordinated disclosure(15:26) The high-quality communication of the AWS security team(17:33) Gitpod sponsor read(18:45) Security researchers vs. "security researchers"(25:54) What's next for the VDP Program?(29:26) Avoiding "security by obscurity"(32:08) Being intentional with security messaging(36:16) Where you can find more from RyanAbout Ryan NoletteRyan is AWS's Senior Security Engineer for the Outreach Team and CoAuthor of AWS Detective. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With almost 2 decades in the infosec field, Ryan has been on the development and operations side of companies such as Postman, Sqrrl, Carbon Black, Crossbeam Systems, SecureWorks and Fidelity Investments. Ryan has been an active speaker and writer on threat hunting and endpoint securityLinksAWS VDP on HackerOne: hackerone.com/aws_vdpAWS VDP inbox: aws-security@amazon.comLinkedIn: www.linkedin.com/in/cloudy-with-a-chance-of-securityAWS Vulnerability Reporting site: https://aws.amazon.com/security/vulnerability-reporting/Give your feedback on the recently expanded VDP program: https://pulse.aws/survey/MOOFGRLMSponsorsBackblaze: https://www.backblaze.com/Gitpod: gitpod.io
Welcome to the WTR with your hosts, Jay and Karl, delving into the latest tech news, gadgets, games, and films! Available On: • Listen on Apple Podcasts | Listen on Spotify | Listen on Youtube | All Major Platforms In This Episode: News Sam Altman's eyeball-scanning crypto project has a new Orb and a new name Sophos to snatch Secureworks in $859M buyout: Why fight when you can just buy? A satellite made by Boeing just fell apart in space Apple teases new Macs in a 'week of announcements' that starts Monday Media Alien: Romulus is getting a VHS release Michelle Yeoh's Star Trek spy movie has a release date Rumours New Magic Mouse, Trackpad and Keyboard coming soon – but don't expect anything exciting We love hearing from you! Drop us a line in the comments or tweet us at @WeeklyT
00:00:00 - PreShow Banter™ — Log Con00:11:41 - BHIS - Talkin' Bout [infosec] News 2024-10-2100:12:51 - Story # 1: Internet Archive exposed again – this time through Zendesk00:14:57 - Story # 1b: Hackers steal information from 31 million Internet Archive users00:20:42 - Story # 2: Sophos buys Secureworks for $859 mln to beef up cybersecurity portfolio00:24:21 - Story # 3: USDoD hacker behind National Public Data breach arrested in Brazil00:27:12 - Story # 4: Debunking Hype: China Hasn't Broken Military Encryption With Quantum00:32:14 - Story # 5: Microsoft said it lost weeks of security logs for its customers' cloud products00:35:03 - Story # 6: Should We Chat, Too? FAQ00:40:05 - Story # 7: More than two dozen countries have used internet outages to sway elections00:43:50 - Story # 8: Pokemon dev Game Freak confirms breach after stolen data leaks online00:46:32 - Story # 9: Hackers made robot vacuums randomly yell racial slurs00:49:19 - Story # 9b: We hacked a robot vacuum — and could watch live through its camera00:50:19 - Story # 10: The government is getting fed up with ransomware payments fueling endless cycle of cyberattacks00:54:55 - Story # 11: Google's Chrome Browser Starts Disabling uBlock Origin01:01:00 - WWHF Recorvery
Fortaleciendo sus soluciones de ciberseguridad, Sophos completó la compra de Secureworks para permitir expandir su oferta de servicios y tecnología, mejorando la protección de empresas a nivel mundial contra amenazas cibernéticas.
At Open Compute Summit this past week, key trends shaping the future of computing and infrastructure were discussed. One major concern is the global data center energy consumption, which is projected to triple by 2030, highlighting the urgent need for more efficient energy solutions. As technology advances, the shift from a 3nm process to a 2nm process is proving costly, with design costs estimated to reach a staggering $725 million, according to ARM. In response to both power demands and design challenges, liquid cooling is gaining momentum, emerging as a vital technology to improve efficiency and manage the increasing heat output from advanced computing systems. Time Stamps: 0:00 - Welcome to the Rundown 1:36 - BMC Starts Two New Companies 4:06 - CEO Indicted for Fraud 7:10 - Microsoft goes agentic AI 10:37 - Amazon Teams Up with US Department of Justice 14:30 - Perplexity Is getting Sued by Media Giants 16:44 - Sophos Acuires Secureworks 20:00 - Exciting Developments from Open Compute Summit 31:41 - The Weeks Ahead 32:56 - Thanks for Watching Hosts: Tom Hollingsworth: https://www.linkedin.com/in/networkingnerd/ Jon Swartz: https://www.linkedin.com/in/jonswartz/ Follow Gestalt IT Website: https://www.GestaltIT.com/ Twitter: https://www.twitter.com/GestaltIT LinkedIn: https://www.linkedin.com/company/Gestalt-IT #Rundown, #OCPSummit24, #AgenticAI, @NetworkingNerd, @JSwartz, @GestaltIT, @TechstrongGroup, @TechstrongTV, @TheFuturumGroup, @BMCSoftware, @Microsoft, @AWSCloud, @Sophos, @Secureworks, @perplexity_ai, @OpenComputePrj,
Sophos to acquire Secureworks, Microsoft announces 10 new AI agents, DJI sues the US Department of Defense for being listed as a “Chinese military company.” MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–without you, none of thisContinue reading "iOS 18.1 Will Include Using Airpods Pro 2 As Hearing Aids – DTH"
On this episode of the Six Five Podcast - Cybersphere, host Shira Rubinoff is joined by Secureworks' Alex Rose, for a conversation that delves into the critical topic of threat intelligence within the sphere of cybersecurity. Their discussion covers: The evolving landscape of cyber threats and the importance of intelligence-driven security strategies. Insightful analysis of recent high-profile cybersecurity incidents and the lessons learned. Secureworks' unique approach to partnering with governments and organizations to fortify defenses. The role of AI and machine learning in enhancing threat detection and response capabilities. The future of cybersecurity and the collaborative efforts needed to mitigate emerging threats.
Alexandra Rose is the Director, Government Partnerships & Counter Threat Unit at Secureworks. In this episode, she joins host Heather Engel to discuss the value of threat intelligence for security leaders, including how it can reduce organizational risk, inform strategic decision-making, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Security analysts respond to security detections and alerts. As part of this, they have to sift through a mountain of data and they have to do it fast. Not in hours, not in days. In minutes.Tom Harrison, security operations manager at Secureworks, explains it perfectly, “We have a time crunch and it's exacerbated by the other big issue security analysts have: we have an absolute ton of data that we have to sift through.”In this episode:Tom explains that security analysts are forced to go back to a pile of data with each subsequent question in their workflow. That's a huge waste of time. And a terrible user experience. Tom says, “It would lead to better accuracy, faster triage, and a better user experience if you can just take me directly to the answer or at the very least a subsection that has the answer I'm looking for.”What does this mean for you as a UX designer designing security products? You need a deep understanding of security analyst workflows to help them identify and respond to attacks as quickly as possible.That way, you can design security products that support users who are under intense pressure to do things quickly. Tom describes how the UX can “guide or complement the workflow.”Tom talks about what gets him excited about integrating AI into security analyst workflows—and what has him worried, as well.Tom Harrison is a Security Operations Manager at Secureworks. We dubbed Tom an “ideas machine” and a fierce advocate for the security analyst user experience. In fact, Tom is conducting UX research in the field better than most UX researchers. He's a passionate teacher and shares his knowledge and resources in a free security reference guide.
Join Lee Rennick at the #CIO100 as she interviews Mike Aiello, CTO, SecureWorks about the award-winning project, Integrated AI for better Security Options and more.
The global meltdown caused by Crowdstrike's failures last month has thrust online security back into the spotlight.See omnystudio.com/listener for privacy information.
Cybercrime is surging, costing trillions of dollars globally this year alone. Alarmingly, despite this threat, millions of cybersecurity jobs stand vacant. The culprit? A lack of gender diversity. Women are a vast pool of untapped talent, and according to Wendy Thomas, CEO at Secureworks, they hold the key to fortifying our defenses. To learn more about Secureworks, visit https://secureworks.com. For more on women in cybersecurity, you can visit our website at https://cybersecurityventures.com.
Cybercrime Magazine attended the 2024 RSA Conference in San Francisco, California, where we spoke with top executives from some of the hottest companies in cybersecurity. During these discussions, one topic consistently rose to the forefront: artificial intelligence. Featured speakers include Ryan Munsch, Principal Program Manager at Microsoft; Tim Gallo, Head of Global Solutions Architects at Google; Yotam Segev, Co-Founder and CEO at Cyera; Stacy Leidwinger, VP of Marketing at Secureworks; Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4; Debbie Gordon, Founder and CEO at Cloud Range; and Seemant Sehgal, Founder and CEO at Breachlock. • For more on cybersecurity, visit us at https://cybersecurityventures.com
How do you help security teams understand what happened and what to do next? Data science can help with that. Serge-Olivier Paquette, CPO at threat intelligence and analytics platform Flare, combines product, cybersecurity, and data science expertise to develop cutting-edge products and experiences that help security teams make informed decisions.In this episode:The best explanation of data science you've ever heard.Why you need to skeptical of data science models.How to leverage data science to be more helpful to security teams.How to build trust—particularly when tools can increasing perform actions on behalf of users.Serge-Olivier Paquette is CPO at Flare, a cybersecurity platform that helps organizations proactively identify security threats. He works at the intersection of product management, data science, cybersecurity, and platform engineering. Serge-Olivier was previously tech lead and senior manager at Secureworks.
Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. Bloomberg News National Security Reporter Kate O'Keeffe discusses Huawei Technologies, the Chinese telecommunications giant blacklisted by the US, secretly funding cutting-edge research at American universities including Harvard through an independent Washington-based foundation. Informatica CEO Amit Walia talks about the company's successful transition to a cloud-centric model. Bloomberg Businessweek Columnist Max Chafkin and Bloomberg News US Semiconductor Reporter Ian King provide the details of their Businessweek Magazine story Intel Is Spending $28 Billion to Make Ohio a Global Chip Capital. Wendy Thomas, CEO at Secureworks, discusses the business of cybersecurity ahead of the RSA conference next week. And we Drive to the Close with Louis Navellier, Founder and CIO at Navellier & Associates.Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
In this week's episode of The Future of Security Operations podcast, Thomas is joined by Brent Deterding. Brent has over 25 years of experience in security, both on the vendor side and now as a security leader. He spent a big part of his career with cloud-native security analytics platform SecureWorks, and he's currently the CISO of Afni, a global provider of contact center solutions in the U.S., Philippines, and Mexico. Brent and Thomas discuss: - His unconventional path to becoming a CISO - Building a security team with zero attrition - Removing the burden of stress in incident response - Strategies for risk prioritization - Facing off against cybercriminal group Scattered Spider - Why prioritization and leadership are among security's biggest challenges - Being dubbed "the happy CISO" after reporting high levels of job satisfaction - Brent's four security non-negotiables - The right way to approach CISOs as a security vendor - Measuring success when you're metrics-averse - What the SOC will - and should - look like in five years The Future of Security Operations is brought to you by Tines, the smart, secure workflow builder that powers some of the world's most important workflows. https://www.tines.com/solutions/security Where to find Brent Deterding: LinkedIn: https://www.linkedin.com/in/brent-deterding/ Afni: https://www.afni.com/ Where to find Thomas Kinsella: LinkedIn: https://www.linkedin.com/in/thomas-kinsella/ Twitter/X: https://twitter.com/thomasksec Tines: https://www.tines.com/ Resources mentioned: How to connect with me as a vendor by Brent Deterding on LinkedIn: https://www.linkedin.com/feed/update/urn:li:activity:7146566282128076800/ In this episode: [01:56] Brent's unconventional path to becoming a CISO [04:10] Finding the right fit at Afni [06:09] Separating his identity from his job and removing the burden of stress [10:22] Why Brent sees risk prioritization and leadership as security's biggest challenges [13:02] Brent's first steps as CISO at Afni including deploying MFA across 10,000 employees [16:29] Going up against threat group Scattered Spider [17:43] Brent's custom risk frameworks [23:03] Measuring success as someone who's metrics-averse [26:19] How Brent developed his unique leadership style [29:13] Supporting his team to do their best work [31:55] Brent's tips for security vendors [36:07] Using AI for resilience and protection [39:20] What security could and should look like in five years [42:53] Connect with Brent
Women held 25 percent of cybersecurity jobs globally in 2022, up from 20 percent in 2019 and around 10 percent in 2013. Cybersecurity Ventures predicts that women will represent 30 percent of the global cybersecurity workforce by 2025, increasing to 35 percent by 2031. We need to move the needle to 50 percent. In this episode, Wendy Thomas, CEO at Secureworks, and Gordon Lawson, CEO at Conceal, discuss women in cybersecurity, the talent crunch in our field, diversity, and more. Learn more about our sponsor at https://conceal.io
Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. Chipotle CEO Brian Niccol shares his thoughts on the restaurant chain's fourth-quarter sales and profit beating expectations. CVS Health CEO Karen Lynch discusses fourth-quarter results and the impact of rising care expenses in its Aetna insurance unit. Bloomberg Businessweek National Correspondent Josh Green provides the details of his Businessweek Magazine story Reagan's Morning in America Offers Lessons for Biden's Campaign. Wendy Thomas, CEO at Secureworks, talks about protecting businesses from deep fakes. And we Drive to the Close with Larry Pitkowsky, Managing Partner at Goodhaven Capital Management. Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
Host Amy and Host James catch up and catch a tan. 1.) MSP Question of The Week What is the best business structure for new MSPs? See: https://www.toptal.com/finance/interim-cfos/c-corp-vs-s-corp#:~:text=Compared%20to%20traditional%20S%20or,it's%20taxed%20as%20a%20corporation --- 2.) More Tech Layoffs? EY Announces Layoffs in Response to Economic Struggles See: https://www.channele2e.com/news/ey-announces-layoffs-in-response-to-economic-struggles "Less than a week after Broadcom finalized its $61 billion acquisition of VMware, layoffs began. This is a familiar pattern for the company, which followed a similar playbook with its acquisition of CA Technologies in 2018. Overall, it's estimated Broadcom will cut about 2,000 employees post-acquisition. Google, Amazon, Snap, Splunk, LinkedIn, Cisco, MariaDB and SecureWorks all recently announced layoffs. Other mass layoffs recently included Intel, Wish and LinkedIn in the San Francisco Bay area. At the beginning of September, Rapid7 announced a restructuring plan following disappointing second-quarter results, resulting in the layoffs of about 18% of the company's workforce. Similarly, AppSec firm Snyk laid off 128 people in April. Cloud security vendor Zscaler announced layoffs after what it called a rough fiscal second quarter. Software tools giant Atlassian laid off 5% of its workforce as it “shifted priorities.” ---- Our upcoming events: AUSTIN TX – MASTERMIND LIVE (March 28-29th) http://bit.ly/kernanmastermind https://kernanconsulting-mastermind.mykajabi.com/mastermind-event Use “EARLYBIRD” as the coupon code to save $200! Irvine CA – SMB Techfest (Feb 8th-9th) Make sure you catch Amy at SMB Techfest! https://www.smbtechfest.com/events.asp Our Social Links: https://www.linkedin.com/in/james-kernan-varcoach/ https://www.facebook.com/james.kernan https://www.facebook.com/karlpalachuk/ https://www.linkedin.com/in/karlpalachuk/ https://www.linkedin.com/in/amybabinchak/ https://www.facebook.com/amy.babinchak/
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence -What keeps Eric up at night -Thinking like an ethical hacker (aka a “penetration tester) -Protecting your information (i.e., “Hardening the attack surface”) -Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections -Having a cool job -The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* -Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* -Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) -The Cyber Zeitgeist – with Dave Bittner (2021) -Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* -What is Hacking? The Economic Times (n.d.) [web] -Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] -Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books -The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) -Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) -Breaking & Entering, J. Smith (Mariner Books, 2019) -The Art of Invisibility, K. Mitnick (L, B & C, 2017) -Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) -Kingpin, K. Poulson (Crown, 2012) -The Cuckoo's Egg, C. Stoll (Doubleday, 1989) -Neuromancer, W. Gibson (Ace, 1984) Articles -2022 State of the Threat: A Year in Review, Secureworks (2022) -The Anthropology of Hackers, The Atlantic (2010) -Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary -DEFCON, The Documentary Network (2013) Resources -Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* -“The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!
Bloomberg Opinion Columnist John Authers and Bloomberg News Equity Markets Reporter Elena Popina share their thoughts on how the Federal Reserve's plan to come down from high rates will be perilous even as the pivot is making everyday a record breaker in the markets. Wendy Thomas, CEO at Secureworks, discusses the impact of new SEC cybersecurity regulations. Sam Darwish, Co-Founder and CEO at IHS Towers, explains the business of building connectivity in developing regions. Bloomberg Businessweek Editor Joel Weber and Bloomberg News Consumer Reporter Deena Shanker provide the details of the Businessweek Magazine story Lab-Grown Chicken Becomes Another Expensive Silicon Valley Mess. And we Drive to the Close with Jay Jacobs, US Head of Thematics and Active Equity ETFs at BlackRock. Hosts: Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
Senior Principal Security Researcher Nestori Syynimaa joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Nestori is an ICT professional with a strong practical and academic background. Since April 2021, Nestori has worked as a Senior Principal Security Researcher at Secureworks' Counter Threat Unit. Before joining Secureworks, he worked as a joint CIO for eight cities and municipalities surrounding Tampere, the largest inland city in Scandinavia. Nestori, Wendy, and Nic discuss the importance of understanding the dynamics between researchers and organizations in addressing security concerns, Nestori's journey as a researcher, his academic background, and his experiences speaking at various conferences worldwide. In This Episode You Will Learn: Challenges and successes in the bug bounty process The importance of researchers confirming fixes to make the process more efficient Ethical considerations for researchers and motivations within the hacking community Some Questions We Ask: What challenges do many organizations face running bug bounty programs? How can you find a trustworthy peer or seasoned researcher to get feedback on your work? Has encountering different cases shaped your understanding of bug bounty programs? Resources: View Nestori Syynimaa on LinkedIn View Wendy Zenone on LinkedIn View Nic Fillingham on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson Uncovering Hidden Risks The Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.
While non-profit doesn't mean "no budget" when it comes to cybersecurity, a lot of smaller to mid-sized non-profits operate on a shoestring, with little to no money for cybersecurity talent or spending. This is where Sightline Security steps in. Sightline's founder and CEO, Kelley Misata joins us today to explain how her own non-profit helps other non-profits improve their cybersecurity posture. As with any category of trends, the success rate of cybercrime ebbs and flows. As Russia seems be a safe haven for cybercriminals, it seemed for a while that the war in Ukraine might disrupt this activity. It did, but only for a short while. Keith Jarvis walks us through the latest types, tactics, and trends in cybercrime. Secureworks' latest State of the Threat report reveals a disturbing dichotomy: how is it we understand our adversaries' so well, but continue to fail to stop them? In this interview, we aim to understand what needs to happen to tilt the odds a bit back in our favor. Segment Resources: Secureworks State of the Threat Report Press Release Segment description coming soon! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw-341
While non-profit doesn't mean "no budget" when it comes to cybersecurity, a lot of smaller to mid-sized non-profits operate on a shoestring, with little to no money for cybersecurity talent or spending. This is where Sightline Security steps in. Sightline's founder and CEO, Kelley Misata joins us today to explain how her own non-profit helps other non-profits improve their cybersecurity posture. As with any category of trends, the success rate of cybercrime ebbs and flows. As Russia seems be a safe haven for cybercriminals, it seemed for a while that the war in Ukraine might disrupt this activity. It did, but only for a short while. Keith Jarvis walks us through the latest types, tactics, and trends in cybercrime. Secureworks' latest State of the Threat report reveals a disturbing dichotomy: how is it we understand our adversaries' so well, but continue to fail to stop them? In this interview, we aim to understand what needs to happen to tilt the odds a bit back in our favor. Segment Resources: Secureworks State of the Threat Report Press Release Segment description coming soon! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw-341
As with any category of trends, the success rate of cybercrime ebbs and flows. As Russia seems be a safe haven for cybercriminals, it seemed for a while that the war in Ukraine might disrupt this activity. It did, but only for a short while. Keith Jarvis walks us through the latest types, tactics, and trends in cybercrime. Secureworks' latest State of the Threat report reveals a disturbing dichotomy: how is it we understand our adversaries' so well, but continue to fail to stop them? In this interview, we aim to understand what needs to happen to tilt the odds a bit back in our favor. Segment Resources: Secureworks State of the Threat Report Press Release Show Notes: https://securityweekly.com/esw-341
Wendy Thomas, CEO at Secureworks, discusses identifying and protecting against cyberattacks. Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
There's much of the electromagnetic spectrum that we cannot see. Like how LED wristbands are triggered at concerts or how to identify someone at DEF CON in a crowd of cellphones and electrical devices. Eric Escobar of SecureWorks provides some really clear analogies to help anyone visualize the differences between NFC, Bluetooth, and Wi Fi such as how your router and your microwave are both 2.4GHz - the difference is the number of watts behind each signal.
In the enterprise security news, Check Point buys Perimeter 81 to augment its cybersecurity 2023 Layoff Tracker: SecureWorks Cuts 300 Jobs Hackers Rig Casino Card-Shuffling Machines for ‘Full Control' Cheating ‘DoubleDrive' attack turns Microsoft OneDrive into ransomware NYC bans TikTok on city-owned devices Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-328
Don Smith is the Vice President of Threat Research at Secureworks. In this episode, he joins host Steve Morgan to discuss CISOs and the boardroom, including what organizations need to know. Secureworks is a leader in cybersecurity providing best-in-class solutions and threat intelligence that reduces risk, optimizes IT and security investments, and fills security team talent gaps. To learn more about our sponsor, visit https://secureworks.com
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence What keeps Eric up at night Thinking like an ethical hacker (aka a “penetration tester) Protecting your information (i.e., “Hardening the attack surface”) Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections Having a cool job The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) The Cyber Zeitgeist – with Dave Bittner (2021) Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* What is Hacking? The Economic Times (n.d.) [web] Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) Breaking & Entering, J. Smith (Mariner Books, 2019) The Art of Invisibility, K. Mitnick (L, B & C, 2017) Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) Kingpin, K. Poulson (Crown, 2012) The Cuckoo's Egg, C. Stoll (Doubleday, 1989) Neuromancer, W. Gibson (Ace, 1984) Articles 2022 State of the Threat: A Year in Review, Secureworks (2022) The Anthropology of Hackers, The Atlantic (2010) Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary DEFCON, The Documentary Network (2013) Resources Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* “The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence What keeps Eric up at night Thinking like an ethical hacker (aka a “penetration tester) Protecting your information (i.e., “Hardening the attack surface”) Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections Having a cool job The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) The Cyber Zeitgeist – with Dave Bittner (2021) Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* What is Hacking? The Economic Times (n.d.) [web] Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) Breaking & Entering, J. Smith (Mariner Books, 2019) The Art of Invisibility, K. Mitnick (L, B & C, 2017) Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) Kingpin, K. Poulson (Crown, 2012) The Cuckoo's Egg, C. Stoll (Doubleday, 1989) Neuromancer, W. Gibson (Ace, 1984) Articles 2022 State of the Threat: A Year in Review, Secureworks (2022) The Anthropology of Hackers, The Atlantic (2010) Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary DEFCON, The Documentary Network (2013) Resources Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* “The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!